In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Croma keying is the process of segmenting objects from images and video using color cues. A blue (or green) screen placed behind an object during recording is used in special effe...
Distributed applications should be able to make use of an object group service in a number of application specific ways. Three main modes of interactions can be identified: (i) re...
The DTS (Dependability Test Suite) fault injection tool can be used to (1) obtain fault injection-based evaluation of system reliability, (2) compare the reliability of different ...
Most eye trackers work well for open eyes. However, blinking is a physiological necessity for humans. Moreover, for applicationssuch as facial expression analysis and driver aware...