A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
A typical task in technical fault detection or medical diagnosis problems is to discriminate normal behavior from one or more types of abnormal behavior by means of different meas...
This paper presents a method for detection of sinusoidal signals corrupted by an additive noise in the short-time Fourier domain. The proposed method is based on probabilistic mod...
We present Joogie, a tool that detects infeasible code in Java programs. Infeasible code is code that does not occur on feasible controlflow paths and thus has no feasible executi...
One of the most important tasks in medical image analysis is to detect the absence or presence of disease in an image, without having precise delineations of pathology available f...