Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
Large archives of Ottoman documents are challenging to many historians all over the world. However, these archives remain inaccessible since manual transcription of such a huge vo...
A realtime system for shrug detection is discussed in this paper. The system is automatically initialized by a face detector based on Ada-boost[14]. After frontal face is localize...
Huazhong Ning, Tony X. Han, Yuxiao Hu, ZhenQiu Zha...
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
Effective and efficient requirements negotiation is a key to the success of software development efforts. For large projects, this can be especially difficult to do effectively an...