A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
We present an approach for recovering the reflectance
of a static scene with known geometry from a collection of
images taken under distant, unknown illumination. In con-
trast ...
Christian Fuchs, Hans-Peter Seidel, Hendrik P. A. ...
Modeling and recognizing landmarks at world-scale is a
useful yet challenging task. There exists no readily available
list of worldwide landmarks. Obtaining reliable visual
mode...
Yantao Zheng, Ming Zhao 0003, Yang Song, Hartwig A...
We introduce a text-based image feature and demon-
strate that it consistently improves performance on hard
object classification problems. The feature is built using
an auxilia...
Classifying an event captured in an image is useful for understanding the contents of the image. The captured event provides context to refine models for the presence and appearan...