Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many fact...
In this paper, we derive concentration of measure inequalities for compressive Toeplitz matrices (having fewer rows than columns) with entries drawn from an independent and identic...
Borhan Molazem Sanandaji, Tyrone L. Vincent, Micha...
Large scale video copy detection task requires compact feature insensitive to various copy changes. Based on local feature trajectory behavior we discover invariant visual pattern...
Abstract. This paper proposes a novel method to detect Furon’s asymmetric watermark by using a correlation detector that is mathematically tractable and simple. The performance o...
Abstract. We introduce a continuous scale wavelet detector. Our algorithm was able to detect a mass that could not be seen using conventional windowing and leveling or traditional ...