Function point analysis(FPA) was proposedto help measure the size of a computerizedbusiness information system. It is widely used in the actual software development. However, it h...
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Logistic models are arguably one of the most widely used data analysis techniques. In this paper, we present analyses focussing on two important aspects of logistic models—its r...
—Traditional movie gross predictions are based on numerical and categorical movie data. But since the 1990s, text sources such as news have been proven to carry extra and meaning...
This paper presents an event detector for emergencies in crowds. Assuming a single camera and a dense crowd we rely on optical flow instead of tracking statistics as a feature to ...
Ernesto L. Andrade, Scott Blunsden, Robert B. Fish...