The work presented here solves two major problems of hand pose recognition: (A) determining what pose is shown in a given, input picture and (B) detecting the presence of a known ...
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
Substantial financial and technological investments by private and public organizations have resulted in the delivery of the third generation mobile technologies, although the jou...
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...