Within the last few years generative modeling techniques have gained attention especially in the context of cultural heritage. As a generative model describes a rather ideal object...
Christoph Schinko, Martin Strobl, Torsten Ullrich,...
To ensure high availability of telephone services, there is considerable interest in network management activities to develop competent fault management mechanisms. In this paper w...
The widely used Support Vector Machine (SVM) method has shown to yield very good results in Supervised Classification problems. Other methods such as Classification Trees have bec...
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Minimum-distance controlled tabular adjustment methods (CTA), and its restricted variants (RCTA), is a recent perturbative approach for tabular data protection. Given a table to be...