Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
We describe the implementation and experimental evaluation of a fault-tolerant leader election service for dynamic systems. Intuitively, distributed applications can use this serv...
This paper presents a novel algorithm for 3D depth estimation using a particle filter (PFDE - Particle Filter Depth Estimation) in a monocular vSLAM (Visual Simultaneous Localiza...
This paper introduces a new Acoustic Echo Suppression (AES) algorithm for suppressing the residual echo after the Acoustic Echo Canceller (AEC). By temporally segmenting the frequ...
In pattern recognition, computer vision, and image processing, many approaches are based on second order operators. Well-known examples are second order networks, the 3D structure...