Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
We address the problem of object-based visual attention from a Bayesian standpoint. We contend with the issue of joint segmentation and saliency computation suitable to provide a ...
In implicit human computer interaction, computers are required to understand users’ actions and intentions so as to provide proactive services. Visual processing has to detect an...
This study addresses the problem of unsupervised visual learning. It examines existing popular model order selection criteria before proposes two novel criteria for improving visu...
We present in this paper an interactive method for numeric or symbolic data visualization that allows a domain expert to extract useful knowledge and information. We propose a new ...