: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
In this paper we present a novel method for reducing false positives in breast mass detection. Our approach is based on using the Two-Dimensional Principal Component Analysis (2DPC...
Embedded system synthesis, multiprocessor synthesis, and thread assignment policy design all require detailed knowledge of the runtime communication patterns among different threa...
Object technology was first created in 1967, but it had to wait till the mid 80’s for widespread acceptance and adoption. We observe that that was not the only hiatus for the te...
We propose an innovative, general purpose, approach to the selection and hierarchical representation of key frames of a video sequence for video summarization. In the first stage ...