Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective co...
Face detection from cluttered images is very challenging due to the diverse variation of face appearance and the complexity of image background. In this paper, we propose a neural...
Predicting human occupations in photos has great application potentials in intelligent services and systems. However, using traditional classification methods cannot reliably dis...
Hop-by-hop inter-domain routing protocols, such as BGP and IDRP, use independent route selection to realize domains' local policies. A domain chooses its routes based on path...
Model driven development (MDD) of software product lines (SPLs) merges two increasing important paradigms that synthesize programs by transformation. MDD creates programs by transf...
Greg Freeman, Don S. Batory, R. Greg Lavender, Jac...