The explosive growth of multimedia and other bandwidth intensive applications has resulted a rapid increase in the size of the traffic loads that needs to be supported by modern n...
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
Abstract--Sensor localization using channel energy measurements of distributed sensors has been studied in various scenarios. However, it is usually assumed that the target does no...
Christian R. Berger, Sora Choi, Shengli Zhou, Pete...
Abstract. This paper presents a novel method of optimizing pointbased correspondence among populations of human cortical surfaces by combining structural cues with probabilistic co...
Ipek Oguz, Marc Niethammer, Joshua E. Cates, Ross ...
We present an approach for online learning of discriminative appearance models for robust multi-target tracking in a crowded scene from a single camera. Although much progress has...