Web 2.0 provided internet users with a dynamic medium, where information is updated continuously and anyone can participate. Though preliminary analysis exists, there is still lit...
Konstantinos N. Vavliakis, Andreas L. Symeonidis, ...
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Compared to other approaches that analyze object trajectories, we propose to detect anomalous video events at three levels considering spatiotemporal context of video objects, i.e...
Fan Jiang, Junsong Yuan, Sotirios A. Tsaftaris, Ag...
In addition to the actual content Web pages consist of navigational elements, templates, and advertisements. This boilerplate text typically is not related to the main content, ma...
In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation), that efficiently disseminate information among sensors in ...
Joanna Kulik, Wendi Rabiner Heinzelman, Hari Balak...