The advance of falsification technology increases security concerns and gives biometrics an important role in security solutions. The electrocardiogram (ECG) is an emerging biometr...
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...
This work investigates supervised word alignment methods that exploit inversion transduction grammar (ITG) constraints. We consider maximum margin and conditional likelihood objec...
Aria Haghighi, John Blitzer, John DeNero, Dan Klei...
In this paper a novel method for view independent human movement representation and recognition, exploiting the rich information contained in multi-view videos, is proposed. The bi...
Nikolaos Gkalelis, Nikos Nikolaidis, Ioannis Pitas
In this study, the authors investigate the use of hyperspectral imaging for food crop monitoring and contamination detection and characterization. The authors investigate the use ...
Terrance West, Lori M. Bruce, Saurabh Prasad, Dani...