Although there have been a number of studies of end-user software development tasks, few of them have considered gender issues for real end-user developers in real-world environme...
Laura Beckwith, Derek Inman, Kyle Rector, Margaret...
In general, in most trust evaluation systems, the evaluation of a target party under investigation relies on the trust ratings from responding peers/parties who have direct intera...
This paper addresses gesture recognition under small sample size, where direct use of traditional classifiers is difficult due to high dimensionality of input space. We propose a ...
Computational photography combines plentiful computing, digital sensors, modern optics, actuators, and smart lights to escape the limitations of traditional cameras, enables novel ...
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In parti...
Steve Babbage, Carlos Cid, Norbert Pramstaller, H&...