In this paper, we propose two approaches for combining geometric information with ICA algorithm to solve permutation problem under the scenario where a rough information about the...
Abstract. Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious en...
In this paper, we propose some extensions of epistemic logic for reasoning about information fusion. The fusion operators considered in this paper include majority merging, arbitra...
Repositories play a pivotal role in an integrated reuse- based application development environment. Reusing software components implies their persistent storage and maintenance, a...
Panos Constantopoulos, Martin Doerr, Yannis Vassil...
Skin detection is employed in tasks like face detection and tracking, naked people detection, hand detection and tracking, people retrieval in databases and Internet, etc. However...