We present a novel technique for segmentation of a JPEGcompressed documentbased on block activity. The activity is measured as the number of bits spent to encode each block. Each ...
Theoretical and experimental analyses of bagging indicate that it is primarily a variance reduction technique. This suggests that bagging should be applied to learning algorithms ...
This paper presents the results of a pilot study on using automatic text categorization techniques in identifying online sexual predators. We report on our SVM and k-NN models. Ou...
Widespread adoption of wireless devices has considerably enlarged the domain of user applications, but consequently specific issues related to a secure use of these devices arise...
Marco Domenico Aime, Andrea S. Atzeni, Antonio Lio...
In this paper the use of graph isomorphism is investigated within the framework of symmetry breaking in constraint satisfaction problems. A running example of Comma-free codes is ...