Organisations that follow the CMM-road towards software process improvement tend to spend large amounts of money and effort. This is certainly the case in the company ING which le...
Rob J. Kusters, Jos J. M. Trienekens, Wilmar Hasso...
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
The expanding and dynamic nature of the Web poses enormous challenges to most data mining techniques that try to extract patterns from Web data, such as Web usage and Web content....
The bag-of-visual-words (BOVW) approaches are widely used in human action recognition. Usually, large vocabulary size of the BOVW is more discriminative for inter-class action clas...
This report will present a collection of tools that supports the precise definition, careful analysis, and execution of processes that coordinate the actions of humans, automated d...
Leon J. Osterweil, Lori A. Clarke, George S. Avrun...