In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Large enterprises in application domains such as finance, banking, travel services, and hospital management use business processes for their day-to-day business. An integral part ...
Eleanna Kafeza, Dickson K. W. Chiu, Kamalakar Karl...
Fitting data by a bounded complexity linear model is equivalent to low-rank approximation of a matrix constructed from the data. The data matrix being Hankel structured is equival...
: This paper provides a methodology to characterize the accuracy of PMU data (GPS-synchronized) and the applicability of this data for monitoring system stability via visualization...
George J. Cokkinides, A. P. Sakis Meliopoulos, Geo...