Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Across many fields involving complex computing, software systems are being augmented with workflow logging functionality. The log data can be effectively organized using declarativ...
In this paper, we propose a new framework for online handwritten mathematical expression recognition. The proposed architecture aims at handling mathematical expression recognitio...
Hybrid of Neural Network (NN) and Hidden Markov Model (HMM) has been popular in word recognition, taking advantage of NN discriminative property and HMM representational capabilit...
Abdul Rahim Ahmad, Christian Viard-Gaudin, Marzuki...
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...