Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
Recent research on computational modeling of visual attention has demonstrated that a bottom-up approach to identifying salient regions within an image can be applied to diverse a...
Oge Marques, Liam M. Mayron, Gustavo B. Borba, Hum...
The people in an image are generally not strangers, but instead often share social relationships such as husband-wife, siblings, grandparent-child, father-child, or mother-child. F...
Gang Wang, Andrew C. Gallagher, Jiebo Luo, David A...
Abstract. Reference process models capture common practices in a given domain and variations thereof. Such models are intended to be configured in a specific setting, leading to in...
Marcello La Rosa, Florian Gottschalk, Marlon Dumas...
A challenge for many online production communities is to direct their members to accomplish tasks that are important to the group, even when these tasks may not match individual m...