In this paper, we present a face authentication system that can be broken down in three stages. Prior to feature extraction, a pose correction step is applied, so that frontal fac...
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
In this paper we describe the design experience gathered from creating an interactive exhibit about medieval music. This system was designed as an educational exhibit that relies ...
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...