Based on the paper "Unseen Object Classes by Between-Class Attribute Transfer" by C.H. Lampert, H. Nickisch, and S. Harmeling. [1] The field of object recognition has developed largely over last ...
Abstract: Access control, the last line of defense for information security, ensures that legitimate users can access resources within only a certain scope of authority. The extraction of high-quality ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results