: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
In this paper, we report the results of a pilot study designed to evaluate the impact of signs as navigation aids in virtual worlds. Test subjects were divided into three groups (...
We tested the efficiency of category learning when participants are provided only with pairs of objects, known to belong either to the same class (Positive Equivalence Constraints ...
To achieve complex missions an autonomous unmanned aerial vehicle (UAV) operating in dynamic environments must have and maintain situational awareness. This can be achieved by cont...
Road sign identification in images is an important issue, in particular for vehicle safety applications. It is usually tackled in three stages: detection, recognition and trackin...
Rachid Belaroussi, Philippe Foucher, Jean-Philippe...