In this paper we examine undesired inference attacks from distributed public XML documents. An undesired inference is a chain of reasoning that leads to protected data of an organ...
Large-scale digitization projects aimed at periodicals often have as input streams of completely unlabeled document images. In such situations, the results produced by the automat...
Iuliu Vasile Konya, Christoph Seibert, Sebastian G...
In this paper the emotional model of the humanoid Cynthea (Cybernetic Networked Humanoid Emotional Agent) robot is presented. The robot is explained at two levels: the cognitive l...
Reliable estimation of visual saliency allows appropriate processing of images without prior knowledge of their content, and thus remains an important step in many computer vision ...
Ming-Ming Cheng, Guo-Xin Zhang, Niloy J. Mitra, Xi...
We present a novel framework to reliably learn scene entry and exit locations using coherent motion regions formed by weak tracking data. We construct “entities” from weak trac...