Abstract. Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the...
Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, W...
Abstract. In this paper we provide a method to find global minimizers of certain non-convex 2-phase image segmentation problems. This is achieved by formulating a convex minimizat...
A major problem in requirements engineering is obtaining requirements that address the concerns of multiple stakeholders. An approach to such a problem is the Theory-W based Spira...
Barry W. Boehm, Prasanta K. Bose, Ellis Horowitz, ...
The lack of adequate training samples and the considerable variations observed in the available image collections due to aging, illumination and pose variations are the two key te...
Jie Wang, Kostas N. Plataniotis, Juwei Lu, Anastas...
—The field of Action Recognition has seen a large increase in activity in recent years. Much of the progress has been through incorporating ideas from single frame object recogn...