Object detection can be challenging when the object class exhibits large variations. One commonly-used strategy is to first partition the space of possible object variations and t...
Quan Yuan, Ashwin Thangali, Vitaly Ablavsky, Stan ...
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired by the negative selection immune system principle. The algorithm was proposed t...
— Recent studies in the field of molecular imaging have demonstrated the need for PET probes capable of imaging very weak activity distributions. Over this range of applications ...
Cognitive radios are devices capable of sensing a large range of frequencies in order to detect the presence of primary networks and reuse their bands when they are not occupied. D...
Jonathan Verlant-Chenet, Julien Renard, Jean-Miche...