Algorithms designed to estimate 3D pose in video sequences enforce temporal consistency but typically overlook an important source of information: The 3D pose of an object, be it r...
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
Robust face detection presents a difficult problem in real interaction scenarios, that, in order to achieve, most often requires employing additional sources of information. In t...
ZhenQiu Zhang, Gerasimos Potamianos, Ming Liu, Tho...
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
This paper presents our work on the detection of temporal information in web pages. The pages examined within the scope of this study were taken from the tourism sector and the te...