Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
This paper proposes new methodology for the detection and matching of salient points over several views of an object. The process is composed by three main phases. In the first st...
Umberto Castellani, Marco Cristani, Simone Fantoni...
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
Stereo sequences promise to be a powerful method for segmenting images for applications such as tracking human figures. We present a method of statistical background modeling for ...
Christopher K. Eveland, Kurt Konolige, Robert C. B...
It was recently proposed the use of Bayesian networks for object tracking. Bayesian networks allow to model the interaction among detected trajectories, in order to obtain a relia...
Arnaldo J. Abrantes, Jorge S. Marques, Pedro Mende...