One of the fundamental challenges of recognizing actions is accounting for the variability that arises when arbitrary cameras capture humans performing actions. In this paper, we ...
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
— This paper presents a saliency-based solution to boost trail detection. The proposed model builds on the empirical observation that trails are usually conspicuous structures in...
The structural properties of graphs are usually characterized in terms of invariants, which are functions of graphs that do not depend on the labeling of the nodes. In this paper ...
Venkat Chandrasekaran, Pablo A. Parrilo, Alan S. W...
A tactical radio network is a radio network in which a transmitter broadcasts the same information to its receivers. In this paper, dynamic spectrum management is studied for multi...