— We formulate a coverage optimization problem for mobile visual sensor networks as a repeated multi-player game. Each visual sensor tries to optimize its own coverage while mini...
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
Companies are experimenting with putting teams into warrooms, hoping for some productivity enhancement. We conducted a field study of six such teams, tracking their activity, atti...
Stephanie Teasley, Lisa Covi, Mayuram S. Krishnan,...
Like model selectionin statistics,the choiceof appropriate Data Mining Algorithms (DM-Algorithms) is a very importanttask in the processof KnowledgeDiscovery.Due to this fact it i...
In this paper, we propose a novel graph embedding method for the problem of lipreading. To characterize the temporal connections among video frames of the same utterance, a new di...