This article presents a new method for discovering hidden patterns in high-dimensional dataset resulting from image registration. It is based on true factor analysis, a statistica...
Abstract. To make effective use of distributed information, it is desirable to allow coordination and collaboration among various information sources. This paper deals with cluster...
Face recognition is among the most challenging techniques for personal identity verification. Even though it is so natural for humans, there are still many hidden mechanisms which ...
Massimo Tistarelli, Linda Brodo, Andrea Lagorio, M...
Abstract. In this tutorial we provide an insight into Web Mining, i.e., discovering knowledge from the World Wide Web, especially with reference to the latest developments in Web t...
Aparna S. Varde, Fabian M. Suchanek, Richi Nayak, ...
In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One appr...