Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
ct 8 For a specific set of features chosen for representing images, the performance of a content-based image retrieval (CBIR) system 9 depends critically on the similarity or diss...
Background: The availability of biomedical literature in electronic format has made it possible to implement automatic text processing methods to expose implicit relationships amo...
In recent years, 3D face recognition has obtained much attention. Using 2D face image as probe and 3D face data as gallery is an alternative method to deal with computation comple...
Weilong Yang, Dong Yi, Zhen Lei, Jitao Sang, Stan ...