The automated detection and tracking of humans in computer vision necessitates improved modeling of the human skin appearance. In this paper we propose a Bayesian network approach...
Ira Cohen, Nicu Sebe, Theo Gevers, Thomas S. Huang
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
Reading detection is an important step in the process of automatic relevance feedback generation based on eye movements for information retrieval tasks. We describe a reading dete...
In this article, we propose a new ontology evolution approach that combines a top-down and a bottom-up approach. This means that the manual request for changes (top-down) by the on...
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...