Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
Many approaches to moving object detection for traffic monitoring and video surveillance proposed in the literature are based on background suppression methods. How to correctly a...
Rita Cucchiara, Costantino Grana, Andrea Prati, Ma...
Abstract: In this paper we present a multi-scale method for the detection of small targets embedded in noisy background. The multiscale representation is built using a weighted und...
Giuseppe Boccignone, Angelo Chianese, Antonio Pica...
In most current approaches of speech processing, information is extracted from the magnitude spectrum. However recent perceptual studies have underlined the importance of the phas...
The research reported in this paper uses wireless sensor networks to provide salient information about spatially distributed dynamic fields, such as regional variations in tempera...