Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
In recent years, rapid technological advances have changed how many existing tasks are performed. For example, the combination of virtual environments and the Internet is presenti...
Margaret McLaughlin, Roger Zimmermann, Leslie S. L...
Abstract. Pervasive systems, and domotics in particular, is an application area where heterogeneity is the norm, with thousands of autonomous heterogeneous devices live together an...
Elena Lazovik, Piet den Dulk, Martijn de Groote, A...
Documentimageunderstandingdenotesthe recognition of semanticallyrelevant componentsin the layout extracted froma documentimage.This recognitionprocessis based on somevisual models...
Floriana Esposito, Donato Malerba, Francesca A. Li...
In this paper, the problem of classification of defects occurring in a textile manufacture is addressed. A new classification scheme is devised in which different features, extrac...