Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
In the absence of manual organization of large digital photo collections, the photos' visual content and creation dates can help support time-based visual search tasks. Curre...
David Huynh, Steven M. Drucker, Patrick Baudisch, ...
Model checkers search the space of possible program behaviors to detect errors and to demonstrate their absence. Despite major advances in reduction and optimization techniques, s...
Matthew B. Dwyer, Sebastian G. Elbaum, Suzette Per...
We present an algorithm for multi-person tracking-bydetection
in a particle filtering framework. To address the
unreliability of current state-of-the-art object detectors, our
a...
Michael D. Breitenstein, Fabian Reichlin, Bastian ...
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...