This paper presents an analysis of the design of classifiers for use in a hierarchical object recognition approach. In this approach, a cascade of classifiers is arranged in a tr...
Bjoern Stenger, Arasanathan Thayananthan, Philip H...
Several factors affecting the automatic classification of musical audio signals are examined. Classification is performed on short audio frames and results are reported as “ba...
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
When it is impractical to rigorously assess all parts of complex systems, test engineers use defect detectors to focus their limited resources. In this article, we define some pr...
Tim Menzies, Justin S. Di Stefano, Kareem Ammar, K...
A simple programmable Java platform-independent distributed computation system has been developed to exploit the free resources on computers linked together by a network. It is a ...
Andrew J. Page, Thomas M. Keane, Richard Allen, Th...