Current networked society present learners with challenges that cannot be sufficiently coped with in educational contexts that are characterized by transmission or participation ep...
A pattern is considered useful if it can be used to help a person to achieve his goal. Mining data streams for useful patterns is important in many applications. However, data stre...
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
In this paper, we present a novel maximum correlation sample subspace method and apply it to human face detection [1] in still images. The algorithm starts by projecting all the t...
We propose a general method to watermark and probabilistically identify the structured outputs of machine learning algorithms. Our method is robust to local editing operations and...
Ashish Venugopal, Jakob Uszkoreit, David Talbot, F...