Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
Video surveillance systems seek to automatically identify events of interest in a variety of situations. Extracting a moving object from background is the most important step of t...
: Global positioning systems (GPS) and mobile phone networks are making it possible to track individual users with an increasing accuracy. It is natural to ask whether one can use ...
Arnon Amir, Alon Efrat, Jussi Myllymaki, Lingeshwa...
This paper proposes a system for model based human motion estimation. We start with a human model generation system, which uses a set of input images to automatically generate a f...
This paper proposes a speech comprehension computational model based on neurocognitiveresearches. The computational representation uses techniques as wavelets transform and connec...