Now showing items 1-6 of 6
Characterization and Detection of Malicious Behavior on the Web
Web platforms enable unprecedented speed and ease in transmission of knowledge, and allow users to communicate and shape opinions. However, the safety, usability and reliability of these platforms is compromised by the ...
Micro Signal Extraction and Analytics
This dissertation studies the extraction of signals that have smaller magnitudes—typically one order of magnitude or more—than the dominating signals, or the extraction of signals that have a smaller topological scale than ...
APPROXIMATION ALGORITHMS FOR FACILITY LOCATION AND CLUSTERING PROBLEMS
Facility Location (FL) problems are among the most fundamental problems in combinatorial optimization. FL problems are also closely related to Clustering problems. Generally, we are given a set of facilities, a set of ...
A REAL TIME IMPLEMENTATION OF 3D SYMMETRIC OBJECT RECONSTRUCTION
KinectFusion is a surface reconstruction method to allow a user to rapidly generate a 3D model of an indoor scene by moving a standard Kinect camera. With a GPU-based pipeline, the system takes in live depth data from a ...
TOWARD SYMBIOTIC HUMAN-AI INTERACTION FOCUSING ON PROGRAMMING BY EXAMPLE
Programming has become a new literacy, but is still inaccessible to ordinary people. Programming-by-example (PBE) is an alternative approach that allows people to teach computers repetitive tasks by demonstrating couple ...
Active Attention for Target Detection and Recognition in Robot Vision
In this thesis, we address problems in building an efficient and reliable target detection and recognition system for robot applications, where the vision module is only one component of the overall system executing the ...