This paper presents a method for face recognition across large changes in viewpoint. Our method is based on a Morphable Model of 3D faces that represents face-specific information...
Volker Blanz, Patrick Grother, P. Jonathon Phillip...
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Expert systems (ESs) are complex information systems that are expensive to build and difficult to validate. Numerous knowledge representation strategies such as rules, semantic net...
The research community plays a very important role in holding valuable scientific knowledge. The authors propose a community mining system which helps to find communities of res...
An important requirement for intelligent assistants is to have an explanation generation mechanism, so that the trainee has a better understanding of the recommended actions and ca...
Francisco Elizalde, Luis Enrique Sucar, Julieta No...