We have developed a method that can discriminate anomalous image sequences for more efficiently utilizing security videos. To match the wide popularity of security cameras, the me...
CT This paper presents a rapid detecting method to tell the external contours from internal ones, and adopt an aid measure of adding 'black points" . These two methods re...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
We present a novel hierarchical force-directed method for drawing large graphs. Given a graph G = (V,E), the algorithm produces an embedding for G in an Euclidean space E of any d...
Pawel Gajer, Michael T. Goodrich, Stephen G. Kobou...
The design of practical language applications by means of statistical approaches requires annotated data, which is one of the most critical constraint. This is particularly true f...
Marco Dinarelli, Alessandro Moschitti, Giuseppe Ri...