Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
This paper compares different confidence measures for the results of statistical face recognition systems. The main applications of a confidence measure are rejection of unknown p...
Existing work on sensor-based activity recognition focuses mainly on single-user activities. However, in real life, activities are often performed by multiple users involving inter...
Layer decomposition from a single image is an underconstrained problem, because there are more unknowns than equations. This paper studies a slightly easier but very useful altern...
Much previous work has investigated weak supervision with HMMs and tag dictionaries for part-of-speech tagging, but there have been no similar investigations for the harder proble...