Recently, advanced video processing systems have been developed for numerous applications, such as surveillance, tracking, monitoring, object and event detection. The large size o...
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
The detection and modeling of the human spine from scanned 3D data is an important issue in biomedical shape analysis. It can be useful for avoiding invasive treatments like radiog...
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...