: In ubiquitous environments computers and smart devices, especially the technical view on them, disappear and users are supported to concentrate on the tasks they actually intend ...
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
Interactively learning from a small sample of unlabeled examples is an enormously challenging task, one that often arises in vision applications. Relevance feedback and more recen...
ShyamSundar Rajaram, Charlie K. Dagli, Nemanja Pet...
: The Out-of-Home (OOH) media markets currently rely on a plethora of methods and technologies for measuring their potential or real success. From nationwide interviews over statis...