Abstract. The successful application of ubiquitous computing in crisis management requires a thorough understanding of the mechanisms that extract information from sensors and comm...
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M....
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
– In this paper, we describe a robot that interacts with humans in a crowded conference environment. The robot detects faces, determines the shirt color of onlooking conference a...
Geoffrey A. Hollinger, Yavor Georgiev, Anthony Man...
- Computer component fabrication is approaching physical limits of traditional photolithographic fabrication techniques. An alternative computer architecture may be enabled by the ...
In this paper, we present an experimental evaluation of three color-spatial retrieval techniques -- the signaturebased technique, the partition-based algorithm and the cluster-bas...