In languages that support polymorphic variants, a single variant value can be passed to many contexts that accept different sets of constructors. Polymorphic variants are potenti...
We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show atta...
This paper describes a support system for archeologists to read “mokkan”. A mokkan is a wooden tablet on which text was written by a brush. Many mokkans used in Nara period (f...
A semi-auto system is developed to acquire playerpossession for broadcast soccer video, whose objective is to minimize the manual work. This research is important because acquirin...
Dynamic face pose change and noise make it difficult to track multi-view faces in a cluttering environment. In this paper, we propose a graphical model based method, which combin...