One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
The problem of identifying approximately duplicate objects in databases is an essential step for the information integration process. Most existing approaches have relied on gener...
Scanned halftone images are degraded for the presence of screen patterns. It’s a challenge to automatically detect the halftone images and remove the noises on the fly. This pap...
Generally, an experienced therapist continuously monitors the affective cues of the children with Autism Spectrum Disorders (ASD) and adjusts the course of the intervention accord...
Changchun Liu, Karla Conn, Nilanjan Sarkar, Wendy ...
We present a novel real-time computer-vision system that robustly discriminates which of the front-row seat occupants is accessing the infotainment controls. The knowledge of who i...