This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
This work is a study of neutrality in the context of Evolutionary Computation systems. In particular, we introduce the use of explicit neutrality with an integer string coding sche...
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
— This paper presents a self-positioning system for the mobile robot. The proposed positioning system consists of a stereo setup of two ODVs (Omni-Directional Vision) for obtaini...
It is a challenging task to accurately model the performance of a face recognition system, and to predict its individual recognition results under various environments. This paper...