Due to the lack of explicit spatial consideration, existing
epitome model may fail for image recognition and target detection,
which directly motivates us to propose the so-calle...
Xinqi Chu, Shuicheng Yan, Liyuan Li, Kap Luk Chan,...
Most tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework called Hidden Markov Model, where the distribution of the object state a...
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Streams of data often originate from many distributed sources. A distributed stream processing system publishes such streams of data and enables queries over the streams. This allo...
Alasdair J. G. Gray, Werner Nutt, M. Howard Willia...
The CIL compiler for core Standard ML compiles whole ML programs using a novel typed intermediate language that supports the generation of type-safe customized data representation...
Allyn Dimock, Ian Westmacott, Robert Muller, Frank...