In embedded cryptosystems, sensitive information can leak via timing, power, and electromagnetic channels. We introduce a novel power-smart system-on-chip architecture that provid...
Radu Muresan, Haleh Vahedi, Y. Zhanrong, Stefano G...
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
We present a system for the estimation of unconstrained
3D human upper body movement from multiple cameras.
Its main novelty lies in the integration of three components:
single-...
In addition to its technical merits as a challenging non-rigid motion and structural integrity analysis problem, quantitative estimation of cardiac regional functions and material...
Automatic evaluation of visual tracking algorithms in the absence of ground truth is a very challenging and important problem. In the context of online appearance modeling, there ...