Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
A typical neuron in visual cortex receives most inputs from other cortical neurons with a roughly similar stimulus preference. Does this arrangement of inputs allow efficient read...
We present the architecture, design, and implementation of a Smart Environment for Network Control, Monitoring and Management (SENCOMM). SENCOMM uses active network technology to ...
Alden W. Jackson, James P. G. Sterbenz, Matthew Co...
We present an algorithm for the segmentation of the liver in 2-D computed tomography slice images. The basis for our algorithm is an implicit active shape model. In order to detec...
This paper proposes an extension to the active contour algorithm for the detection of linear patterns within remote sensing and vibration data. The proposed technique uses an alte...