Statistical methods for voice conversion are usually based on a single model selected in order to represent a tradeoff between goodness of fit and complexity. In this paper we ass...
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
In this paper, we propose new Fourier-Statistical Features (FSF) in RGB space for detecting text in video frames of unconstrained background, different fonts, different scripts and...
Palaiahnakote Shivakumara, Trung Quy Phan, Chew Li...
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
The size of human fingers and the lack of sensing precision can make precise touch screen interactions difficult. We present a set of five techniques, called Dual Finger Selection...