In previous works, we showed how sequential pattern mining can be used to extract a partial problem space from logged user interactions for a procedural and ill-defined domain wher...
Philippe Fournier-Viger, Roger Nkambou, Engelbert ...
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
In structure-from-motion with a single camera it is well
known that the scene can be only recovered up to a scale. In
order to compute the absolute scale, one needs to know the
...
Davide Scaramuzza, Friedrich Fraundorfer, Marc Pol...
A weakly-supervised extraction method identifies concepts within conceptual hierarchies, at the appropriate level of specificity (e.g., Bank vs. Institution), to which attribute...
Systems based on statistical and machine learning methods have been shown to be extremely effective and scalable for the analysis of large amount of textual data. However, in the r...