Abstract. Many realistic user tasks involve the retrieval of specific entities instead of just any type of documents. Examples of information needs include ‘Countries where one ...
Arjen P. de Vries, Anne-Marie Vercoustre, James A....
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...
Abstract. In this paper we present a novel general framework for encoding and evolving networks called Common Genetic Encoding (CGE) that can be applied to both direct and indirect...
Yohannes Kassahun, Jan Hendrik Metzen, Jose de Gea...
Abstract. Most existing methods for determining localization of the image feature point are still inefficient in terms of the precision. In the paper, we propose a new algorithm fo...
Abstract. In this paper we take a fresh look at the problem of extracting shape from contours of human faces. We focus on two key questions: how can we robustly fit a 3D face mode...