The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
A successful representation of objects in the literature is as a collection of patches, or parts, with a certain appearance and position. The relative locations of the different p...
In this paper we propose a new framework for modeling 2D shapes. A shape is first described by a sequence of local features (e.g., curvature) of the shape boundary. The resulting ...
In this paper, we describe a statistical method to detect highlights in a baseball game video. The input video is first segmented into scene shots, within which the camera motion ...
It is widely believed that some queries submitted to search engines are by nature ambiguous (e.g., java, apple). However, few studies have investigated the questions of "how ...