We present a novel algorithm for structural analysis of audio to detect repetitive patterns that are suitable for content-based audio information retrieval systems, since repetiti...
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Abstract. In this paper, we present algorithms to automatically detect and match landmark curves on cortical surfaces to get an optimized brain conformal parametrization. First, we...
Lok Ming Lui, Yalin Wang, Tony F. Chan, Paul M. Th...
Broadcasters often reuse video clips while reporting news stories. New clips are added to the story as it develops replacing old clips. A subset of these video clips may be replay...
Jedrzej Z. Miadowicz, John M. Gauch, Abhishek Shiv...