When attempting to annotate music, it is important to consider both acoustic content and social context. This paper explores techniques for collecting and combining multiple sourc...
Douglas Turnbull, Luke Barrington, Gert R. G. Lanc...
In this paper, we propose to improve the verification performance of contract-free palmprint recognition system by means of feature-level image registration and pixel-level fusio...
Modern Application Specific Instruction Set Processors (ASIPs) have customizable caches, where the size, associativity and line size can all be customized to suit a particular ap...
Andhi Janapsatya, Aleksandar Ignjatovic, Sri Param...
In this paper we describe an interactive community bulletin board we installed within a neighborhood café and art gallery, and the interactions that take place around and through...
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...