Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
— Image keypoints are broadly used in robotics for different purposes, ranging from recognition to 3D reconstruction, passing by SLAM and visual servoing. Robust keypoint matchin...
When the training instances of the target class are heavily outnumbered by non-target training instances, SVMs can be ineffective in determining the class boundary. To remedy this...
When an application retrieves serialized objects for which the class has changed, it may have to cope with modifications of the semantics. While there are numerous ways to handle t...
An experiment in collaborative learning was conducted in two introductory programming courses at Loyola College in Maryland. Data collected included background information on stud...