We address the problem of motion blur removal from an image sequence that was acquired by a sensor with nonlinear response. Motion blur removal in purely linear settings has been ...
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
We present a theoretical study on the discriminative clustering framework, recently proposed for simultaneous subspace selection via linear discriminant analysis (LDA) and cluster...
In this paper, we study an online make-to-order variant of the classical joint replenishment problem (JRP) that has been studied extensively over the years and plays a fundamental...
This paper presents an exploratory study of Information Systems (IS) competencies of business managers in Europe. Following resource-based theory and a knowledge-based view of IS ...