We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
GPS-equipped taxis can be viewed as pervasive sensors and the large-scale digital traces produced allow us to reveal many hidden “facts” about the city dynamics and human beha...
Daqing Zhang, Nan Li, Zhi-Hua Zhou, Chao Chen, Lin...
Background: Tiling-arrays are applicable to multiple types of biological research questions. Due to its advantages (high sensitivity, resolution, unbiased), the technology is ofte...
Erdogan Taskesen, Renee Beekman, Jeroen de Ridder,...
Locating moving objects in a video sequence is the first step of many computer vision applications. Among the various motion-detection techniques, background subtraction methods a...
Segmentation of continuous audio is important for speaker indexing. The reliability of models in speaker indexing depends much on segmentation. Commonly used method is based on th...