We describe a vision system that monitors activity in a site over extended periods of time. The system uses a distributed set of sensors to cover the site, and an adaptive tracker...
W. Eric L. Grimson, Chris Stauffer, R. Romano, L. ...
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Background: Cellular metabolism can be characterized by networks of enzymatic reactions and transport processes capable of supporting cellular life. Our aim is to find evolutionar...
Hee Shin Kim, Jay E. Mittenthal, Gustavo Caetano-A...
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the f...
— Web services composition is a very active area of research due to the growing interest of public and private organizations in services integration and/or low cost development o...
Giusy Di Lorenzo, Nicola Mazzocca, Francesco Mosca...