Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Symmetry is an effective geometric cue to facilitate conventional segmentation techniques on images of man-made environment. Based on three fundamental principles that summarize t...
Allen Y. Yang, Shankar Rao, Kun Huang, Wei Hong, Y...
Conventional vision systems and algorithms assume the camera to have a single viewpoint. However, sensors need not always maintain a single viewpoint. For instance, an incorrectly...
Rahul Swaminathan, Michael D. Grossberg, Shree K. ...
This paper discusses how to utilize both magnitude and phase information obtained from the complex directional lter bank (CDFB) for the purpose of texture image retrieval. The rel...