In this paper we present a natural language interface architecture, which is used for accessing FAQ knowledge bases. Since one of the main obstacles to the efficient use of natura...
In this paper we consider the problem of detecting multiple point-like targets in the presence of steering vector mismatches and Gaussian disturbance with unknown covariance matri...
Chengpeng Hao, Francesco Bandiera, Jun Yang, Chaoh...
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Exploiting the concepts of social networking represents a novel approach to the approximate similarity query processing. We present a metric social network where relations between...
In this paper a new method for on-line signature authentication will be presented, which is based on a event-string modelling of features derived from pen-position and pressure si...