In this poster, based on our previous work in building a lightweight DDoS (Distributed Denial-of-Services) attacks detection mechanism for web server using TCM-KNN (Transductive C...
Li Guo, Qin-Wu Nie, Tianbo Lu, Yang Li, Zhihong Ti...
Within the taxonomy of feature extraction methods, recently the Wrapper approaches lost some popularity due to the associated computational burden, compared to Embedded or Filter m...
Erik Schaffernicht, Volker Stephan, Horst-Michael ...
In recent years, many networks have become available for analysis, including social networks, sensor networks, biological networks, etc. Graph clustering has shown its effectivenes...
We propose a real-time pose invariant face recognition algorithm from a gallery of frontal images only. First, we modified the second order minimization method for active appearan...
As the complexity of industrial processes increases, it requires the use of intelligent sensors or actuators (known as Intelligent Instruments) to allow for more comprehensive and...
Richard Dapoigny, Patrick Barlatier, Laurent Foull...