: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
In this paper we address the problem of unsupervised Web data extraction. We show that unsupervised Web data extraction becomes feasible when supposing pages that are made up of r...
This paper presents a rule-based approach that utilizes some types of contextual information to improve the accuracy of handwritten mathematical expression(ME) recognition. Mining...
Kang Kim, Taik-Heon Rhee, Jae Seung Lee, Jin Hyung...
In this paper, we propose a novel temporal template, called Chrono-Gait Image (CGI), to describe the spatio-temporal walking pattern for human identification by gait. The CGI temp...