Background: Computational identification of blood-secretory proteins, especially proteins with differentially expressed genes in diseased tissues, can provide highly useful inform...
Most existing sensor planning algorithms find it difficult to tackle the discrepancy between a PTZ camera's limited instant field of view (FOV) and panoramic achievable FOV. ...
Andreas Koschan, Besma R. Abidi, Chung-Hao Chen, D...
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
We present a real-time algorithm to estimate the 3D
pose of a previously unseen face from a single range im-
age. Based on a novel shape signature to identify noses in
range ima...
The application of a technique for labelling connected components based on the classical recursive technique is studied. The recursive approach permits labelling, counting, and cha...