As the amount of available data continues to increase, more and more effective means for discovering important patterns and relationships within that data are required. Although t...
Many organizations are in the process of replacing legacy systems with large, integrated systems using new technological platforms. Accurate estimation of project resources requir...
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
Abstract. Distributed or peer-to-peer storage solutions rely on the introduction of redundant data to be fault-tolerant and to achieve high reliability. One way to introduce redund...
Recently sparse representation has been applied to visual tracker by modeling the target appearance using a sparse approximation over a template set, which leads to the so-called ...