The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
The RVM-based learning method for whole body pose estimation proposed by Agarwal and Triggs is adapted to hand pose recovery. To help overcome the difficulties presented by the g...
In this paper we develop a technique for measuring the perceptual equivalence of a graphical scene to a real scene. Ability to compare images is valuable in computer graphics for a...
Ann McNamara, Alan Chalmers, Tom Troscianko, Erik ...
In this paper, we bring out a new density-based clustering initialization algorithm which is invariant to the scale factor. Instead of using the scale factor while the cluster ini...