The Group-centric Secure Information Sharing (g-SIS) family of models has been proposed for modeling environments in which group dynamics dictate information-sharing policies and ...
Through our art project, Metaphone, we explored a particular form of aesthetics referred to in the arts tradition as machine aesthetics. The Metaphone machine collects the partici...
—We show how to exploit temporal and spatial coherence to achieve efficient and effective text detection and decoding for a sensor suite moving through an environment in which t...
Hsueh-Cheng Wang, Yafim Landa, Maurice F. Fallon, ...
The mixed database workloads generated by enterprise applications can be categorized into shortrunning transactional as well as long-running analytical queries with resource-inten...
There is a call for change in the treatment of ICT curriculum in our schools driven by the relatively recent acknowledgement of the growing importance of ICT in industry and socie...
Regression-based techniques have shown promising results for people counting in crowded scenes. However, most existing techniques require expensive and laborious data annotation fo...
Owing to visual ambiguities and disparities, person re-identification methods inevitably produce suboptimal rank-list, which still requires exhaustive human eyeballing to identify ...
Generating coherent synopsis for surveillance video stream remains a formidable challenge due to the ambiguity and uncertainty inherent to visual observations. In contrast to exist...
While clustering is usually an unsupervised operation, there are circumstances in which we have prior belief that pairs of samples should (or should not) be assigned to the same cl...