Wireless sensor networks typically consist of a large number of sensor nodes embedded in a physical space. Such sensors are low-power devices that are primarily used for monitoring...
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
Appearance information is essential for applications such as tracking and people recognition. One of the main problems of using appearance-based discriminative models is the ambig...
Abstract— Particle Filters have been widely used as a powerful optimization tool for nonlinear, non-Gaussian dynamic models such as Simultaneous Localization and Mapping (SLAM) a...
Motion segmentation is a fundamental aspect of tracking in a scene with multiple moving objects. In this paper we present a novel approach to clustering individual image pixels ass...
Hua Yang, Greg Welch, Jan-Michael Frahm, Marc Poll...