We present an approach to user re-authentication based on the data collected from the computer’s mouse device. Our underlying hypothesis is that one can successfully model user ...
This paper pertains to the recognition of textural regions for color video analysis. The proposed scheme uses the covariance of 2nd -order statistics on the wavelet domain, betwee...
Dimitrios K. Iakovidis, Dimitrios E. Maroulis, S. ...
This paper discusses measures to make a distributed system based on the Time-Triggered Architecture resistant to arbitrary node failures. To achieve this, the presented approach i...
Namedentityrecognition isimportantinsophisticatedinformation service system such as Question Answering and Text Mining since most of the answer type and text mining unit depend on...
We present similarity-based methods to cluster digital photos by time and image content. The approach is general, unsupervised, and makes minimal assumptions regarding the structu...
Matthew L. Cooper, Jonathan Foote, Andreas Girgens...