This paper proposes a novel subspace approach towards direct identification of a residual model for fault detection and isolation (FDI) in a system with non-uniformly sampled mult...
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
The lifetime of solid-state image sensors is limited by the appearance of defects, particularly hot-pixels, which we have previously shown to develop continuously over the sensor ...
Jenny Leung, Glenn H. Chapman, Zahava Koren, Israe...
Abstract--We propose a framework for discovery of collaborative community structure in Wiki-based knowledge repositories based on raw-content generation analysis. We leverage topic...
Petko Bogdanov, Nicholas D. Larusso, Ambuj K. Sing...
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. Blob analysis, a method for analyzing the movement of the head and hands bas...
Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas...