This work proposes a new methodology for automatically validating the internal lighting system of an automotive, i.e., assessing the visual quality of an instrument cluster (IC) f...
Alexandre W. C. Faria, David Menotti, Daniel S. D....
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
This paper presents a method for automatic multimodal person authentication using speech, face and visual speech modalities. The proposed method uses the motion information to loc...
—Event-related potentials (ERPs) recorded at the scalp are indicators of brain activity associated with eventrelated information processing; hence they may be suitable for the as...
Akaysha C. Tang, Matthew T. Sutherland, Christophe...
Radiologists disagree with each other over the characteristics and features of what constitutes a normal mammogram and the terminology to use in the associated radiology report. R...
Robert M. Patton, Thomas E. Potok, Barbara G. Beck...