Abstract— A Wireless Mesh Network (WMN) is being considered for commercial use in spite of several unaddressed issues. In this paper we focus on one of the most critical issues: ...
Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this...
Many surface computing prototypes have employed gestures created by system designers. Although such gestures are appropriate for early investigations, they are not necessarily ref...
Jacob O. Wobbrock, Meredith Ringel Morris, Andrew ...
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
The aim of this work is to investigate how to exploit the temporal information in a video sequence for the task of face recognition. Following the approach in [11], we propose a p...