Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
In this paper, we present an automatic web image mining system towards building a universal human age estimator based on facial information, which is applicable to all ethnic grou...
The perception and recognition of spatial layout of objects within a three-dimensional setting was studied using a virtual reality (VR) simulation. The subjects' task was to d...
In a business environment, making the right decisions is vital for the success of a company. Making right decisions is inevitably bound to the availability and provision of releva...