Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
This article proposes a method for learning object templates
composed of local sketches and local textures, and
investigates the relative importance of the sketches and textures
...
Haifeng Gong, Song Chun Zhu, Ying Nian Wu, Zhangzh...
This paper introduces a novel way to leverage the implicit geometry of sparse local features (e.g. SIFT operator) for the purposes of object detection and segmentation. A two-clas...
Nonnegative Matrix Factorization (NMF) is a powerful decomposition tool which has been used in several content representation applications recently. However, there are some diffic...