Different features carry more or less rich and varied pieces of information to characterize a pattern. The fusion of these different sources of information can provide an opportun...
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Companies engage in IT-projects in order to gain some benefits; however they complain that those benefits are difficult to achieve. On the basis of a survey in the Swiss financial...
We show that a simple, memory-based technique for appearance-based face recognition, motivated by the realworld task of visitor identification, can outperform more sophisticated a...
Terence Sim, Rahul Sukthankar, Matthew D. Mullin, ...
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. Blob analysis, a method for analyzing the movement of the head and hands bas...
Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas...