Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
Given a database with missing or uncertain content, our goal is to correct and fill the database by extracting specific information from a large corpus such as the Web, and to d...
Human activity recognition has potential to impact a wide range of applications from surveillance to human computer interfaces to content based video retrieval. Recently, the rapi...
Kiwon Yun, Jean Honorio, Debaleena Chattopadhyay, ...
Recognizing the conversational context in which group interactions unfold has applications in machines that support collaborative work and perform automatic social inference using ...
Dinesh Babu Jayagopi, Taemie Kim, Alex Pentland, D...
Pre-symptomatic drought stress prediction is of great relevance in precision plant protection, ultimately helping to meet the challenge of “How to feed a hungry world?”. Unfor...
Kristian Kersting, Zhao Xu, Mirwaes Wahabzada, Chr...