Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Old photos may be affected by several types of defects. Manual restorers use their own taxonomy to classify damages by which a photo is affected, in order to apply the proper rest...
Edoardo Ardizzone, A. De Polo, Haris Dindo, Giusep...
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...
This paper describes a way of designing modulation filter by datadriven analysis which improves the performance of automatic speech recognition systems that operate in real envir...
This paper addresses the problem of identifying musical instruments in polyphonic music. Musical instrument identification (MII) is an improtant task in music information retriev...