Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
: This paper examines the personalization of online training simulations which are a key modern approach in computer aided education. More specifically it focuses on the difficulti...
Research shows that comment spamming (comments which are unsolicited, unrelated, abusive, hateful, commercial advertisements etc) in online discussion forums has become a common p...
In this paper, a data-driven extension of the variational algorithm is proposed. Based on a few selected sensors, target tracking is performed distributively without any informati...
Hichem Snoussi, Jean-Yves Tourneret, Petar M. Djur...
We present a system for interactively capturing, constructing, and rendering surface light fields by incrementally building a low rank approximation to the surface light field. ...
Greg Coombe, Chad Hantak, Anselmo Lastra, Radek Gr...