Detecting pedestrians in images is a key functionality to avoid vehicle-to-pedestrian collisions. The most promising detectors rely on appearance-based pedestrian classifiers tra...
Francisco Marin Tur, David Vazquez, David Geronimo...
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
Hand detection is a fundamental step in many practical applications as gesture recognition, video surveillance, and multimodal machine interface and so on. The aim of this paper i...
Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-C...
The problem of detecting overlapped speech in stereo recordings using close-talk microphones is important for a variety of applications including the identification of back-chann...
Bo Xiao, Prasanta Kumar Ghosh, Panayiotis G. Georg...
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...