Abstract. This paper presents an integrated approach for robustly locating facial landmark for drivers. In the first step a cascade of probability learners is used to detect the f...
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
There are three set operators defined in XQuery, namely union, intersect and except. They take node sequences as operands, in which each node is identified by its node-ID and tr...
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Accurate and robust estimation of the three-dimensional left ventricular geometry and deformation has important clinical implications for better diagnosis and understanding of isch...