We propose a new fast facial-feature extraction technique for embedded face-recognition applications. A deformable feature model is adopted, of which the parameters are optimized t...
— Internet worm attacks pose a significant threat to network security. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms...
Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou,...
This paper presents a method for automatically estimating human interruptibility in home environments. To make online remote communication smoother, determining if it is appropria...
Abstract. Java is widely deployed on a variety of processor architectures. Consequently, an understanding of microarchitecture level Java performance is critical to optimize curren...
For a large class of applications, there is time to train the system. In this paper, we propose a learning-based approach to patch perspective rectification, and show that it is b...
Stefan Hinterstoisser, Selim Benhimane, Nassir Nav...