: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
In table soccer, humans can not always thoroughly observe fast actions like rod spins and kicks. However, this is necessary in order to detect rule violations for example for tourn...
We consider the design of systems for sequential decentralized detection, a problem that entails several interdependent choices: the choice of a stopping rule (specifying the samp...
XuanLong Nguyen, Martin J. Wainwright, Michael I. ...
We present a fast, robust, and low cost pupil detection technique that uses two near infra red time multiplexed light sources synchronized with the camera frame rate. The two ligh...
Carlos Hitoshi Morimoto, David Koons, Arnon Amir, ...
During a project examining the use of machine learning techniques for oil spill detection, we have encountered several essential questions that we believe deserve the attention of ...