Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
— This paper makes new contributions in motion detection, object segmentation and trajectory estimation to create a successful object tracking system. A new efficient motion det...
In this paper, we demonstrate a technique called active probing used to study TCP implementations. Active probing treats a TCP implementation as a black box, and uses a set of pro...
— There is not a method for analysing unreplicated factorial designs that performs well for various configurations of number and size of active effects. Moreover, the most popula...
Segmentation of ancient documents is challenging. In the worst cases, text characters become fragmented as the results of strong degradation processes. New active contour methods ...