Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
In this paper we present a low-complexity traffic prioritization strategy for video transmission using the H.264 scalable video coding (SVC) standard over 802.11e wireless networ...
Interest point detection is an established method to select relevent image regions. Such techniques use features like corners or edges, which are known to indicate regions likely ...
Finding correspondences between two (widely) separated views is essential for several computer vision tasks, such as structure and motion estimation and object recognition. In the...
— The paper presents a thought experiment as to the feasibility of using large scale wireless sensor networks as a vehicle for high level scientific investigation. The discussion...