Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
The sliding correlator technique remains one of the most versatile and effective methods for sounding the radio propagation channel in next-generation wireless systems. Despite the...
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Abstract. Systems supporting situation awareness typically integrate information about a large number of real-world objects anchored in time and space provided by multiple sources....
Norbert Baumgartner, Wolfgang Gottesheim, Stefan M...
To achieve a face recognition system robust to the presence of glasses, we have developped a glasses detection and extraction algorithm. Detection is realized using edge informati...