In this paper, we extend the conventional vector quantization by incorporating a vigilance parameter, which steers the tradeoff between plasticity and stability during incremental...
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
We present a highly accurate method for classifying web pages based on link percentage, which is the percentage of text characters that are parts of links normalized by the number...
Most Gene Regulatory Network (GRN) studies ignore the impact of the noisy nature of gene expression data despite its significant influence upon inferred results. This paper present...
Muhammad Shoaib B. Sehgal, Iqbal Gondal, Laurence ...
Coding based methods are among the most promising palmprint recognition methods. As one representative coding method, the competitive code first convolves the palmprint image with...
Feng Yue, Wangmeng Zuo, Kuanquan Wang, David Zhang