—In this paper, we present an approach to nonlinear model reduction based on representing a nonlinear system with a piecewise-linear system and then reducing each of the pieces w...
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
— A biologically inspired foveated attention system in an object detection scenario is proposed. Thereby, a highperformance active multi-focal camera system imitates visual behav...
Abstract— This paper presents a method for detecting independent temporally-persistent motion patterns in image sequences. The result is a description of the dynamic content of a...
By acquiring high angular resolution diffusion weighted magnetic resonance images (HARDI), Q-Ball analysis can disclose the 3D organization of fibrous tissue such as the brain whi...
Steven Delputte, Hans Dierckx, Els Fieremans, Yves...