There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Abstract. This paper presents a general framework to segment curvilinear objects in 2D images. A pre-processing step relies on mathematical morphology to obtain a connected line wh...
We present an approach to the recognition of complexshaped objects in cluttered environments based on edge cues. We first use example images of the desired object in typical backg...
We have implemented a neurobiologically plausible system on a robot that integrates visual attention, object recognition, language and action processing using a coherent cortex-lik...
Rebecca Fay, Ulrich Kaufmann, Andreas Knoblauch, H...
Abstract. In this paper we present di erent approaches to structuring covariance matrices within statistical classi ers. This is motivated by the fact that the use of full covarian...