The wide availability of large scale databases requires more efļ¬cient and scalable tools for data understanding and knowledge discovery. In this paper, we present a method to ļ¬...
Duy-Dinh Le, Shin'ichi Satoh, Michael E. Houle, Da...
Ensuring the uniqueness of trademark images and protecting their identities are the most important objectives for the trademark registration process. To prevent trademark infringe...
Reinier H. van Leuken, M. Fatih Demirci, Victoria ...
the following cost functions: In this paper, learning rules are proposed for simultaneous corn- GI(U) = tr{(UTU)(UTBU)-lD, (la) putation of minor eigenvectors of a covariance matri...
The identiļ¬cation of near-duplicate keyframe (NDK) pairs is a useful task for a variety of applications such as news story threading and content-based video search. In this pape...
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate āstepping stonesā to conceal their identity and origin...