— Testing and verification are important methods for gaining confidence in the reliability of a software product. Keeping this confidence up is especially difficult for softw...
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
Level set methods have been proven to be efficient tools for tracing interface problems. Recently, some variants of the Osher- Sethian level set methods, which are called the Piece...
Abstract. We present a comparative study on how to use discriminative learning methods such as classification, regression, and ranking to address deformable shape segmentation. Tra...
Jingdan Zhang, Shaohua Kevin Zhou, Dorin Comaniciu...
Projective transformations relate the coordinates of images that are taken by either a camera that undergoes only rotation while imaging an arbitrary scene, or one that rotates an...
Richard J. Radke, Peter J. Ramadge, Tomio Echigo, ...