The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
This paper presents a novel method for detecting scale
invariant keypoints. It fills a gap in the set of available
methods, as it proposes a scale-selection mechanism for
juncti...
Wolfgang F¨orstner, Timo Dickscheid, Falko Schind...
In this paper, an image retrieval methodology suited for search in large collections of heterogeneous images is presented. The proposed approach employs a fully unsupervised segme...
Vasileios Mezaris, Ioannis Kompatsiaris, Michael G...
We tackle the problem of disambiguating entities on the Web. We propose a user-driven scheme where graphs of entities ? represented by globally identifiable declarative artifacts ...
Hermann de Meer, Karl Aberer, Michael Jost, Parisa...