Security API analysis typically only considers a subset of an API’s functions, with results bounded by the number of function calls. Furthermore, attacks involving partial leakag...
Abstract. In applications such as video post-production users are confronted with large amounts of redundant unedited raw material, called rushes. Viewing and organizing this mater...
In this paper we present a system for automatic annotation of humans passing a surveillance camera. Each human has 4 associated annotations: the primary color of the clothing, the...
D. M. Hansen, Bjarne K. Mortensen, P. T. Duizer, J...
This paper considers the problem of learning cellular signaling networks from incomplete measurements of pathway activity. Cells respond to environmental changes (e.g., starvation...
This paper presents a maximum likelihood (ML) framework for multimicrophone sound source localization (SSL). Besides deriving the framework, we focus on making the connection and ...