When building a representation of the environment for a robot in a multi-agent application, as is the case of robotic soccer, sensor and information fusion of several elements of t...
This case study looks at the issues involved in operating a sophisticated scientific instrument as a computer peripheral accessible over a high-speed network. A custom interactive...
Philip J. Mercurio, T. Todd Elvins, Stephen J. You...
We propose a discriminative classifier learning approach to image modeling for spam image identification. We analyze a large number of images extracted from the SpamArchive spam c...
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Many techniques have been reported for handwriting-based writer identification. Most such techniques assume that the written text is fixed (e.g., in signature verification). In th...
H. E. S. Said, G. S. Peake, T. N. Tan, Keith D. Ba...