View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Richly labeled images representing several sub-structures of an organ occur quite frequently in medical images. For example, a typical brain image can be labeled into grey matter, ...
James G. Malcolm, Yogesh Rathi, Martha Elizabeth...
In this paper, we exploit a novel ranking mechanism that processes query samples with noisy labels, motivated by the practical application of web image search re-ranking where the...
We assume a sensor network with data-centric storage, where sensor data is stored within the sensor network and ad hoc queries are disseminated and processed inside the network. I...
Ping Xia, Panos K. Chrysanthis, Alexandros Labrini...
Abstract. We analyze the expected cost of a greedy active learning algorithm. Our analysis extends previous work to a more general setting in which different queries have differe...