Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
—Text-line extraction is a key task in document analysis. Methods based on anisotropic Gaussian filtering and ridge detection have shown good results. This paper describes perfo...
Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breu...
:Many motion object detection algorithms rely on the process of background subtraction, an important technique which is used for detecting changes from a model of the background ...
Fluorescence microscopy is a powerful imaging tool for studying molecular dynamics in living cells. For quantitative motion analysis of subcellular structures robust and accurate ...
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...