Abstract. Our participation at ResPubliQA 2010 was based on applying an Information Retrieval (IR) engine of high performance and a validation step for removing incorrect answers. ...
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
There exist several methods to extend binary morphology to grey-scale images. One of these methods is based on fuzzy logic and fuzzy set theory. Another approach starts from the c...
Traditional shape from silhouette methods compute the 3D shape as the intersection of the back-projected silhouettes in the 3D space, the so called visual hull. However, silhouett...
Botnets have become the most powerful tool for attackers to victimize countless users across cyberspace. Previous work on botnet detection has mainly focused on identifying infecte...
Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai ...