The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
In this paper, we present a novel approach for music structure analysis. A new segmentation method, beat space segmentation, is proposed and used for music chord detection and voc...
Namunu Chinthaka Maddage, Changsheng Xu, Mohan S. ...
In this paper requirements and conditions for the visitor identification system are outlined and an example system is proposed. Two main subsystems: face detection and face recogn...
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Four time-frequency and time-scale methods are studied for their ability of detecting myoclonic seizures from accelerometric data. Methods that are used are: the short-time Fourier...
Tamara M. E. Nijsen, Ronald M. Aarts, Pierre J. M....