A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To addre...
Yi-Chang Shih, Abe Davis, Samuel W. Hasinoff, Fr&e...
We present an approach to real-time person tracking in crowded and/or unknown environments using multi-modal integration. We combine stereo, color, and face detection modules into...
Trevor Darrell, Gaile G. Gordon, Michael Harville,...
Detecting objects, estimating their pose and recovering 3D shape information is a critical problem in many vision and robotics applications. This paper addresses the above needs by...