We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Efficient and accurate fitting of Active Appearance
Models (AAM) is a key requirement for many applications.
The most efficient fitting algorithm today is Inverse Compositional
...
Brian Amberg (University of Basel), Andrew Blake (...
One recent change in software development is developers starting to take responsibility for the quality of their work by writing and executing automated tests. As with any new act...
: We are developing a robotic measurement facility which makes it very easy to build “reality-based” models, i.e., computational models of existing, physical objects based on a...
Dinesh K. Pai, Jochen Lang, John E. Lloyd, Robert ...
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...