—As devices are expected to be aware of their environment, the challenge becomes how to accommodate these abilities with the power constraints which plague modern mobile devices....
Dawud Gordon, Stephan Sigg, Yong Ding, Michael Bei...
Despite decades of study, robust shadow detection remains difficult, especially within a single color image. We describe a new approach to detect shadow boundaries in images of o...
Xiang Huang, Gang Hua, Jack Tumblin, Lance William...
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
With the development of highly efficient graph data collection technology in many application fields, classification of graph data emerges as an important topic in the data mining...