Psychophysical studies have shown that humans actively exploit temporal information such as contiguity of images in object recognition. We have recently developed a recognition sy...
Arnulf B. A. Graf, Christian Wallraven, Heinrich H...
Cryptographic algorithms implemented on smart-cards must be protected against side-channel attacks. Some encryption schemes and hash functions like IDEA, RC6, MD5, SHA-1 alternate ...
In a popular visual illusion, the portrait on paper currency is folded into an M shape along vertical lines through the nose and the eyes. When this folded picture is tilted back ...
We present a novel technique to accurately map the complete field-of-coverage of a camera to its pan-tilt space in an efficient manner. This camera model enables mapping the coordi...
Previous research on materialized views has primarily been in the context of flat relational databases--materialized views defined in terms of one or more flat relations. This pape...
Akira Kawaguchi, Daniel F. Lieuwen, Inderpal Singh...