Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
—While most activity recognition systems rely on data-driven approaches, the use of knowledge-driven techniques is gaining increasing interest. Research in this field has mainly...
Daniele Riboni, Linda Pareschi, Laura Radaelli, Cl...
—Spatial augmented reality using controllable projector-camera-systems to project onto objects directly, or Projected Reality as we call it, offers the possibility to augment obj...
Mathematical texts can be computerized in many ways that capture differing amounts of the mathematical meaning. At one end, there is document imaging, which captures the arrangeme...
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...