— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
Software estimation models should support managerial decision making in software projects. We experience that most of current models do not achieve this goal to the extend manager...
In this paper, we propose a novel occlusion invariant face recognition algorithm based on Selective Local Nonnegative Matrix Factorization (S-LNMF) technique. The proposed algorith...
Hyun Jun Oh, Kyoung Mu Lee, Sang Uk Lee, Chung-Hyu...
Eye tracking has long held the promise of being a useful methodology for human computer interaction. However, a number of barriers have stood in the way of the integration of eye ...
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal ...
Ling Huang, Minos N. Garofalakis, Joseph M. Heller...