Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
We wish to match sets of images to sets of images where both sets are undergoing various distortions such as viewpoint and lighting changes. To this end we have developed a Joint ...
Registration of a preoperative CT (3D) image to one or more X-ray projection (2D) images, a special case of the pose estimation problem, has been attempted in a variety of ways wi...
Daniel B. Russakoff, Torsten Rohlfing, Calvin R. M...
We describe our experiences in designing new media technologies in cooperation with Liberia's Truth and Reconciliation Commission. This work includes two major projects: a dy...
Michael L. Best, Thomas N. Smyth, Daniel Serrano-B...
Formal code inspections are employed by teams of professional software engineers to identify software defects and improve the quality of software. After reviewing a piece of code ...
Christopher D. Hundhausen, Anukrati Agrawal, Dana ...