Recently Viola et al. have introduced a rapid object detection scheme based on a boosted cascade of simple feature classifiers. In this paper we introduce and empirically analysis ...
Rainer Lienhart, Alexander Kuranov, Vadim Pisarevs...
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
: Modularity is one of the most important principles in software engineering and a necessity for every practical software. Since the design space of software is generally quite lar...
We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
In this paper, we propose a new algorithm to boost performance of traditional Linear Discriminant Analysis (LDA)-based face recognition (FR) methods in complex FR tasks, where hig...
Juwei Lu, Konstantinos N. Plataniotis, Anastasios ...