—We consider surveillance applications in which sensors are deployed in large numbers to improve coverage fidelity. Previous research has studied how to select active sensor cov...
In this paper, we present an online citation entry clustering system based on three-tier clustering. The objective is to further process search results returned by bibliography dat...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
In the form of topic discussions, users interact with each other to share knowledge and exchange information in online forums. Modeling the evolution of topic discussion reveals h...
Hao Wu, Jiajun Bu, Chun Chen, Can Wang, Guang Qiu,...
— In this paper, we present a new approach for automatic car detection from aerial images. The system exploits a robust machine learning method known as boosting for efficient c...
Thuy Thi Nguyen, Helmut Grabner, Horst Bischof, B....