In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
— An iterative feature selection method based on feature typicality and interactivity analysis is presented in this paper. The aim is to enhance model interpretability by selecti...
Cyril Mazaud, Jan Rendek, Vincent Bombardier, Laur...
In this work we report results on the use of symbolic knowledge representation and reasoning (KRR) for perceptual anchoring. This is the creation and maintenance of a connection b...
We describe an immersive music visualization application which enables interaction between a live musician and a responsive virtual character. The character reacts to live performa...
We propose a non-intrusive eye tracking system intended for the use of everyday gaze typing using web cameras. We argue that high precision in gaze tracking is not needed for on-s...
Dan Witzner Hansen, John Paulin Hansen, Mads Niels...