CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
The PLS approach is a widely used technique to estimate path models relating various blocks of variables measured from the same population. It is frequently applied in the social s...
Sven Serneels, Christophe Croux, Peter Filzmoser, ...
This paper presents results, at an early stage of research work, of the use of fuzzy decision trees in a multimedia framework. We present the discovery of rules in three different ...
State-of-the-art pronoun interpretation systems rely predominantly on morphosyntactic contextual features. While the use of deep knowledge and inference to improve these models wo...
Andrew Kehler, Douglas E. Appelt, Lara Taylor, Ale...