We propose a two-step method for detecting human heads and estimating face orientations under the dynamic environment. In the first step, the method employs an ellipse as the cont...
Abstract. We present a “memory-model-sensitive” approach to validating correctness properties for multithreaded programs. Our key insight is that by specifying both the inter-t...
Advanced typing, matching, and evaluation strategy features, as well as very general conditional rules, are routinely used in equational programming languages such as, for example...
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
In this paper we study two classes of imprecise previsions, which we termed convex and centered convex previsions, in the framework of Walley’s theory of imprecise previsions. W...