This paper contributes a new boosting paradigm to achieve detection of events in video. Previous boosting paradigms in vision focus on single frame detection and do not scale to v...
We present an object detection system that is applied to detecting pedestrians in still images, without assuming any a priori knowledge about the image. The system works as follow...
Abstract—The classification of sequences requires the combination of information from different time points. In this paper the detection of facial expressions is considered. Exp...
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
— Iterative equalization has emerged as an efficient means of achieving near-capacity detection performance in multiple-antenna (MIMO) systems. However, many proposed detection ...
Steffen Bittner, Ernesto Zimmermann, Gerhard Fettw...
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
This paper investigates asymptotically optimal scalar quantizers to address QIM watermark detection with i.i.d. host data and additive noise. False-alarm probability of detection ...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
Design defects come from poor design choices and have the effect of degrading the quality of object-oriented designs. Therefore, they present opportunities for improvements. Howev...
Today, the Internet is used by companies frequently since it simplifies daily work, speeds up communication, and saves money. But the more popular the Internet gets the more it su...
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...