Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
Children with autism often exhibit self-stimulatory (or “stimming”) behaviors. We present an on-body sensing system for continuous recognition of stimming activity. By creatin...
Tracy L. Westeyn, Kristin Vadas, Xuehai Bian, Thad...
Abstract. In this paper we address the problem of comparing multimedia documents, which can be described according to different reference models. If we consider presentations as c...
Profiling customers’ behavior has become increasingly important for many applications such as fraud detection, targeted marketing and promotion. Customer behavior profiles are cr...
In this paper we present an approach for separating two transparent layers of complex non-rigid scene dynamics. The dynamics in one of the layers is assumed to be repetitive, whil...