The suggestions made by current IDE's code completion features are based exclusively on static type system of the programming language. As a result, often proposals are made ...
This paper describes an application of active learning methods to the classification of phone strings recognized using unsupervised phonotactic models. The only training data req...
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Abstract. Multimedia applications require the transmission of realtime streams over a network. These streams often exhibit variable bandwidth requirements, and require high bandwid...
Laser-scanning methods are a means to observe streaming particles, such as the flow of red blood cells in a blood vessel. Typically, particle velocity is extracted from images form...
Patrick J. Drew, Pablo Blinder, Gert Cauwenberghs,...