Copyright 2004 IEEE. Published in Conference on Computer Vision and Pattern Recognition (CVPR-2004), June 27 - July 2, 2004, Washington DC. Personal use of this material is permit...
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Content-based retrieval has emerged in the face of content explosion as a promising approach to information access. In this paper, we focus on the challenging issue of recognizing ...
Yi-Hsuan Yang, Yu-Ching Lin, Ya-Fan Su, Homer H. C...
Background: Dysfunction in the endolysosome, a late endosomal to lysosomal degradative intracellular compartment, is an early hallmark of some neurodegenerative diseases, in parti...
Saravana K. Kumarasamy, Yunshi Wang, Vignesh Viswa...