Abstract. The branching pattern and geometry of coronary microvessels are of high interest to understand and model the blood flow distribution and the processes of contrast invasi...
H. E. Bennink, Hans C. van Assen, Geert J. Streeks...
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
This paper presents the evaluation results of a system for tracking humans in surveillance videos. Moving blobs are detected based on adaptive background modeling. A shape based mu...
Bo Wu, Vivek Kumar Singh, C.-H. Kuo, Li Zhang, Sun...
The evaluation results of a system for tracking humans in surveillance videos are presented. Moving blobs are detected based on adaptive background modeling. A shape based multi-vi...
Bo Wu, Xuefeng Song, Vivek Kumar Singh, Ram Nevati...