Background: Analysis of DNA microarray data takes as input spot intensity measurements from scanner software and returns differential expression of genes between two conditions, t...
Allan A. Sioson, Shrinivasrao P. Mane, Pinghua Li,...
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Tagged Magnetic Resonance Imaging (MRI) is a non-invasive technique used to examine cardiac deformation in vivo. An Angle Image is a representation of a Tagged MRI which recovers t...
Joel Barajas, Jaume Garcia-Barnes, Francesc Carrer...
This paper presents a region-based image retrieval (RBIR) system in which users can choose specific regions as the query. Our goal is to assist the user to formulate more precise q...
In this paper, we present a novel approach for tracking a lecturer during the course of his speech. We use features from multiple cameras and microphones, and process them in a jo...
Kai Nickel, Tobias Gehrig, Rainer Stiefelhagen, Jo...