Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
In this paper, we explore the use of Random Forests (RFs) in the structured language model (SLM), which uses rich syntactic information in predicting the next word based on words ...
A non-dominated sorting genetic algorithm is used to evolve models of learning from different theories for multiple tasks. Correlation analysis is performed to identify parameters...
In the absence of real data for extensive testing of newly designed large-scale biometrics recognition systems a number of solutions are possible including use of resampling metho...
We introduce an algorithm that guides the user to tag
faces in the best possible order during a face recognition assisted
tagging scenario. In particular, we extend the active
l...
Ashish Kapoor, Gang Hua, Amir Akbarzadeh and Simon...