Interest in face recognition systems has increased significantly due to the emergence of significant commercial opportunities in surveillance and security applications. In this pa...
Sina Jahanbin, Hyohoon Choi, Alan C. Bovik, Kennet...
Monitoring the resources of distributed systems is essential to the successful deployment and execution of grid applications, particularly when such applications have welldefined...
Sandip Agarwala, Christian Poellabauer, Jiantao Ko...
Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection so...
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, J...
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
This article presents a geometric fusion algorithm developed for the reconstruction of 3D surface models from hand-held sensor data. Hand-held systems allow full 3D movement of th...