Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
Abstract. In this paper we present a new approach for establishing correspondences between sparse image features related by an unknown non-rigid mapping and corrupted by clutter an...
Lorenzo Torresani, Vladimir Kolmogorov, Carsten Ro...
We present ProtCV (Protein Clustering and Visualization) a new software tool for grouping samples (mass spectra peak-lists) emanating from a high throughput proteomics analysis ba...
Stavroula Ventoura, Eugenia G. Giannopoulou, Elias...
- This work presents the development of a brain computer interface as an alternative communication channel to be used in Robotics. It encompasses the implementation of an electroen...
Hand signals are commonly used in applications such as giving instructions to a pilot for airplane takeoff or direction of a crane operator by a foreman on the ground. A new algor...