The paper is concerned with two-class active learning. While the common approach for collecting data in active learning is to select samples close to the classification boundary,...
Current Web Engineering methods develop "closed" web applications from conceptual models. This fact makes difficult the integration and the interoperability of different ...
Victoria Torres, Joan Fons, Oscar Asensi, Vicente ...
Atypical observations, which are called outliers, are one of difficulties to apply standard Gaussian density based pattern classification methods. Large number of outliers makes di...
Abstract. We investigate a number of approaches to pose invariant face recognition. Basically, the methods involve three sequential functions for capturing nonlinear manifolds of f...
Spoofing with photograph or video is one of the most common manner to circumvent a face recognition system. In this paper, we present a real-time and non-intrusive method to addre...