This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Learning visual models of object categories notoriously requires thousands of training examples; this is due to the diversity and richness of object appearance which requires mode...
The common approach to image matching is to detect spatial features present in both images and create a mapping that relates both images. The main drawback of this method takes pl...
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
—Millions of surveillance cameras record video around the clock, producing huge video archives. Even when a video archive is known to include critical activities, finding them i...