Most current multi-task learning frameworks ignore the robustness issue, which means that the presence of "outlier" tasks may greatly reduce overall system performance. ...
We describe a video indexing system that aims at indexing large video files in relation to the presence of similar faces. The detection of near-frontal view faces is done with a c...
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Networks of sensors and simulation models of the physical environment have been implemented separately, often using agent-based methodologies. Some work has been done in providing...
—In this paper the problem of evaluating the statistics of the connected nodes position in a multi-hop wireless random ad hoc network is addressed. In particular, an analytical m...