Many different methods for tracking humans were proposed in the past several years, but only a few authors examined the accuracy of the proposed systems. As the accuracy analysis ...
In this paper, we present a texture descriptor which hinges in the use of the local image statistics so as to recover a compact representation of the texture under study. To this ...
Pattaraporn Khuwuthyakorn, Antonio Robles-Kelly, J...
Beyond conventional linear and kernel-based feature extraction, we present a more generalized formulation for feature extraction in this paper. Two representative algorithms using ...
The types of police inquiries performed these days are incredibly diverse. Often data processing architectures are not suited to cope with this diversity since most of the case dat...
Jonas Poelmans, Paul Elzinga, Stijn Viaene, Guido ...
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...