1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
An innovative technique for segmentation of color images is proposed. The technique implements an approach based on thresholding of the hue histogram. A new function for detecting...
Carmelo Amoroso, Antonio Chella, Vito Morreale, Pi...
We present a robust vision system for single person tracking inside a smart room using multiple synchronized, calibrated, stationary cameras. The system consists of two main compo...
ZhenQiu Zhang, Gerasimos Potamianos, Stephen M. Ch...