Outlier analysis is an important task in data mining and has attracted much attention in both research and applications. Previous work on outlier detection involves different type...
Wen Jin, Yuelong Jiang, Weining Qian, Anthony K. H...
In this paper, we present a novel method for human action recognition from any arbitrary view image sequence that uses the Cartesian component of optical flow velocity and human ...
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
This study explores interruption patterns among software developers who program in pairs versus those who program solo. Ethnographic observations indicate that interruption length...
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...