Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
After the handwritten segmentation process, it is common to have connected digits. This is due to the great size and shape digit variations. In addition, the acquisition and the b...
Cristiano de Santana Pereira, George D. C. Cavalca...
We introduce a new method that characterizes typical local image features (e.g., SIFT [9], phase feature [3]) in terms of their distinctiveness, detectability, and robustness to i...
We present a component-based system for object detection and identification. From a set of training images of a given object we extract a large number of components which are clust...
Bernd Heisele, Ivaylo Riskov, Christian Morgenster...