Emotion is central to human interactions, and automatic detection could enhance our experience with technologies. We investigate the linguistic expression of fine-grained emotion ...
Alastair J. Gill, Robert M. French, Darren Gergle,...
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
In this paper, we derive bounds on the Structural SIMilarity (SSIM) Index as a function of quantization rate for fixed-rate uniform quantization of image discrete cosine transform...
Sumohana S. Channappayya, Alan C. Bovik, Robert W....
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...