-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...
Supporting the varied software feature requirements of multiple variants of a software product-line while promoting reuse forces product line engineers to use general-purpose, fea...
Today, there is significant sharing of information artifacts among users on various social media sites, including Digg, Twitter and Flickr. An interesting consequence of such ric...
In this paper a gesture recognition system using 3D data is described. The system relies on a novel 3D sensor that generates a dense range image of the scene. The main novelty of ...
Sotiris Malassiotis, Niki Aifanti, Michael G. Stri...
Conventional remote sensing classification techniques that model the data in each class with a multivariate Gaussian distribution are inefficient, as this assumption is generally ...
Chintan A. Shah, Manoj K. Arora, Stefan A. Robila,...