Network intrusion detection systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite au...
Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Sm...
This paper presents a new model to overcome the occlusion problems coming from wide baseline multiple camera stereo. Rather than explicitly modeling occlusions in the matching cos...
A novel nonlinear scale space framework is proposed for the purpose of multiscale image representation. The scale space decomposition problem is formulated as a general Bayesian l...
Akshaya Kumar Mishra, Alexander Wong, David A. Cla...
—Many indoor localization methods are based on the association of 802.11 wireless RF signals from wireless access points (WAPs) with location labels. An “organic” RF position...
Jun-geun Park, Dorothy Curtis, Seth J. Teller, Jon...
Within-subject analysis in fMRI essentially addresses two problems, the detection of brain regions eliciting evoked activity and the estimation of the underlying dynamics. In [1, 2...