Two of the most critical requirementsin support of producing reliableface-recognition systems are a large database of facial images and a testing procedure to evaluate systems. Th...
P. Jonathon Phillips, Hyeonjoon Moon, Patrick J. R...
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
The growing demand for portable electronic devices has led to an increased emphasis on power consumption within the semiconductor industry. As a result, designers are now encourag...
A new type of computer-aided engineering environment is envisioned which will improve the productivity of manufacturing/industrial engineers. This environment would be used by eng...
We present an overview of the program transformation techniques which have been proposed over the past twenty-five years in the context of logic programming. We consider the appro...
Alberto Pettorossi, Maurizio Proietti, Valerio Sen...