One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Abstract. In human face recognition, different facial regions have different degrees of importance, and exploiting such information would hopefully improve the accuracy of the reco...
An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of audio content. It can be used to identify audio, even when of severely dist...
Abstract. Solution techniques for Constraint Satisfaction and Optimisation Problems often make use of backtrack search methods, exploiting variable and value ordering heuristics. I...
Locating resources of interest in a large resourceintensive environment is a challenging problem. In this paper we present research on addressing this problem through the developm...
Mehmet S. Aktas, Marlon E. Pierce, Geoffrey Fox, D...