In the present paper, a method for detecting changes between two images of the same scene taken at different times using their joint intensity histogram is proposed. First, the jo...
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another...
This paper compares the ability of human observers to detect target image curves with that of an ideal observer. The target curves are sampled from a generative model which speciï...
Alan L. Yuille, Fang Fang, Paul R. Schrater, Danie...
Background: cDNA microarrays are a powerful means to screen for biologically relevant gene expression changes, but are often limited by their ability to detect small changes accur...
Bin Yao, Sanjay N. Rakhade, Qunfang Li, Sharlin Ah...