In many computer vision applications, such as face recognition and hand pose estimation, we need systems that can recognize a very large number of classes. Large margin classifica...
Vassilis Athitsos, Alexandra Stefan, Quan Yuan, St...
The paper presents several novel 3D image analysis algorithms, applied towards the segmentation and modeling of faces and hands. These are subsequently used to build a face-based ...
It has been widely advocated that software architecture an effective set of abstractions for engineering (families of) complex software systems. However, architectural concepts ar...
Sam Malek, Chiyoung Seo, Sharmila Ravula, Brad Pet...
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...