Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
Recent years have seen increased interest within the speaker recognition community in high-level features including, for example, lexical choice, idiomatic expressions or syntacti...
Christopher Cieri, Stephanie Strassel, Meghan Lamm...
In this paper, we propose an automated approach to track and recognize daily activities. Any activity is represented in this research as a sequence of raw sensors data. These seque...
This paper presents a new real-time localization system for a mobile robot. We show that autonomous navigation is possible in outdoor situation with the use of a single camera and ...
Eric Royer, Maxime Lhuillier, Michel Dhome, Jean-M...
Recognizing commonly used data structures and algorithms is a key activity in reverse engineering. Systems developed to automate this recognition process have been isolated, stand...