Most programming languages support a call stack in the programming model and also in the runtime system. We show that for applications targeting low-power embedded microcontroller...
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
This paper introduces a novel deformable model for face mapping and its application to automatic person identification. While most face recognition techniques directly model the f...
For a finite set of points lying on a lower dimensional manifold embedded in a high-dimensional data space, algorithms have been developed to study the manifold structure. Howeve...
The goal of this article is to present an effective and robust tracking algorithm for nonlinear feet motion by deploying particle filter integrated with Gaussian process latent v...