—To improve software quality, static or dynamic verification tools accept programming rules as input and detect their violations in software as defects. As these programming rul...
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
One of the persistent topics in digital forensic research in recent years has been the problem of finding all things similar. Developed tools usually take on the form of similarit...
Object detection in video surveillance is typically done through background subtraction or temporal differencing. While these techniques perform very well under scenes where there...
We are developing a complex computer aided diagnosis (CAD) system to detect small pulmonary nodules from helical CT scans. Here we present a classifier to reduce the number of fal...
Martin Dolejsi, Jan Kybic, Stanislav Tuma, Michal ...
Visual surveillance applications such as object identification, object tracking, and anomaly detection require reliable motion detection as an initial processing step. Such a dete...
This paper demonstrates how to reduce the hand labeling effort considerably by 3D information in an object detection task. In particular, we demonstrate how an efficient car detec...
Stefan Kluckner, Georg Pacher, Helmut Grabner, Hor...