This paper presents a family of techniques that we call congealing for modeling image classes from data. The idea is to start with a set of images and make them appear as similar a...
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
Language usage over computer mediated discourses, like chats, emails and SMS texts, significantly differs from the standard form of the language. An urge towards shorter message l...
When modelling complex systems one can not include all the causal factors, but one has to settle for partial models. This is alright if the factors left out are either so constant...
Abstract— The need for efficient monitoring of spatiotemporal dynamics in large environmental surveillance applications motivates the use of robotic sensors to achieve sufficie...
Amarjeet Singh 0003, Fabio Ramos, Hugh D. Whyte, W...