Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
Spatio-temporal data streams that are generated from mobile stream sources (e.g., mobile sensors) experience similar environmental conditions that result in distinct phenomena. Sev...
One common way to extend the battery life of a portable device is to reduce the LCD backlight intensity. In contrast to previous approaches that minimize the power consumption by a...
In this paper, we propose a new method, video repairing, to robustly infer missing static background and moving foreground due to severe damage or occlusion from a video. To recov...
Jiaya Jia, Tai-Pang Wu, Yu-Wing Tai, Chi-Keung Tan...
In this paper, we overcome a major drawback of the level set framework: the lack of point correspondences. We maintain explicit backward correspondences from the evolving interfac...