Abstract. The pressing need for scalable query answering has motivated the development of many incomplete ontology-based reasoners. Improving the completeness of such systems witho...
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
Cell line identification is emerging as an essential method for every cell line user in research community to avoid using misidentified cell lines for experiments and publications...
In this paper, we study the problem of social relational inference using visual concepts which serve as indicators of actors’ social interactions. While social network analysis ...
We present a method for reconstructing a trajectory of an object moving in front of non-overlapping fully or partially calibrated cameras. The non-overlapping setup turns that pro...