Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
It is important for drowsiness detection systems to warn the driver before the critical stages of drowsiness arise and thus to provide sufficient intervention time for the driver...
Esra Vural, Marian Stewart Bartlett, Gwen Littlewo...
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Abstract— Sensor networks have evolved to a powerful infrastructure component for event monitoring in many application scenarios. In addition to simple filter and aggregation op...
Daniel Klan, Katja Hose, Marcel Karnstedt, Kai-Uwe...
We describe a system for guiding blind and visually impaired wheelchair users along a clear path that uses computer vision to sense the presence of obstacles or other terrain feat...
Volodymyr Ivanchenko, James Coughlan, William Gerr...