e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Vision-based hand gesture interfaces require fast and extremely robust hand detection. Here, we study view-specific hand posture detection with an object recognition method recent...
Parallelization of embedded software is often desirable for power/performance-related considerations for computation-intensive applications that frequently occur in the signal-pro...
Sankalita Saha, Shuvra S. Bhattacharyya, Wayne Wol...