Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
The last few years have seen the emergence of two parallel trends: the first of such trends is set by technologies such as Near Field Communication, 2D Bar codes and RFID that supp...
Massimo Paolucci, Gregor Broll, John Hamard, Enric...
In this paper, we consider the problem of combining link and content analysis for community detection from networked data, such as paper citation networks and Word Wide Web. Most ...
This paper describes a segmentation technique to automatically extract the myocardium in 4 0 cardiac M R images for quantitative cardiac analysis and the diagnosis of patients. Th...
Marie-Pierre Jolly, Nicolae Duta, Gareth Funka-Lea
This paper presents an algorithm capable of real-time separation of foreground from background in monocular video sequences. Automatic segmentation of layers from colour/contrast ...
Antonio Criminisi, Geoffrey Cross, Andrew Blake, V...