Face recognition using 3D information has been intensively investigated in recent years. The features selected from 3D facial surfaces are invariant to pose and lighting condition...
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
Abstract. Distributed knowledge management systems (DKMS) have been suggested to meet the requirements of today’s knowledge management. Peer-to-peer systems offer technical found...
Marc Ehrig, Christoph Schmitz, Steffen Staab, Juli...
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
: A pilot interface system is developed for computer-aided diagnostic and interventional assistance of cardiologists based on clinical trials. The system includes optimized methods...
Maya Dimitrova, Chavdar Roumenin, Siya Lozanova, L...