Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
Abstract— We report on our experiences regarding the acquisition of hybrid Semantic 3D Object Maps for indoor household environments, in particular kitchens, out of sensed 3D poi...
Radu Bogdan Rusu, Zoltan Csaba Marton, Nico Blodow...
The DB2 Design Advisor in IBM® DB2® Universal Database™ (DB2 UDB) Version 8.2 for Linux®, UNIX® and Windows® is a tool that, for a given workload, automatically recommends ...
Daniel C. Zilio, Jun Rao, Sam Lightstone, Guy M. L...
Kernel associative memory (KAM) has previously been proposed as an efficient scheme for face recognition. In this paper, a hybrid method of combining KAM and Gabor wavelet transfo...
Emotions play an important role in cognitive processes and specially in learning tasks. Moreover, there are some evidences that the emotional state of the learner correlated with h...