We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Because of their lack of rules, general broadcast videos are more difficult to analyze than news or sport videos. To retrieve human interventions in this context, a robust face tr...
—We have previously developed a neurodynamical model of motion segregation in cortical visual area V1 and MT of the dorsal stream. The model explains how motion ambiguities cause...
Efficient segmentation of globally optimal surfaces in volumetric images is a central problem in many medical image analysis applications. Intra-class variance has been successful...
A novel method is introduced to recognize and estimate the scale of time-varying human gestures. It exploits the changes in contours along spatio-temporal directions. Each contour...