In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Online product reviews are becoming increasingly available, and are being used more and more frequently by consumers in order to choose among competing products. Tools that rank co...
Stefano Baccianella, Andrea Esuli, Fabrizio Sebast...
There has been a growing interest in exploiting contextual information in addition to local features to detect and localize multiple object categories in an image. Context models ...
Myung Jin Choi, Joseph Lim, Antonio Torralba, Alan...
We present an efficient pixel-sampling technique for histogram-based search. Given a template image as a query, a typical histogram-based algorithm aims to find the location of ...
A cord, although simple in form, has many interesting physical affordances that make it powerful as an input device. Not only can a length of cord be grasped in different location...
Julia Schwarz, Chris Harrison, Scott E. Hudson, Je...