In this work a cooperative, bid-based, model for problem decomposition is proposed with application to discrete action domains such as classification. This represents a significan...
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
In this paper, we propose an automatic learning method for gesture recognition. We combine two different pattern recognition techniques: the SelfOrganizing Map (SOM) and Support Ve...
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...
Abstract— Tying suture knots is a time-consuming task performed frequently during Minimally Invasive Surgery (MIS). Automating this task could greatly reduce total surgery time f...
Hermann Georg Mayer, Faustino J. Gomez, Daan Wiers...