Most existing work uses dual decomposition and subgradient methods to solve Network Utility Maximization (NUM) problems in a distributed manner, which suffer from slow rate of con...
Abstract— In this paper, we analyze and compare five imagebased visual servoing control laws. Three of them are classical while two new ones are proposed. The first new control...
Because of the randomness of biometric features, traditional methods cannot perform well in the encryption of fingerprint template. The Fuzzy Vault construct is a biometric crypt...
Face detection systems have recently achieved high detection rates[11, 8, 5] and real-time performance[11]. However, these methods usually rely on a huge training database (around...
An emerging tapestry of computations will soon integrate systems around the globe. It will evolve without central control. Its complexity will be vast. We need new ideas, tools an...