Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Techniques that can introduce low-dimensional feature representation with enhanced discriminatory power is of paramount importance in face recognition applications. It is well kno...
Juwei Lu, Kostas N. Plataniotis, Anastasios N. Ven...
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
Nowadays, users not only want to watch digital videos on a PC but also use mobile devices to play back multimedia content. Video adaptation algorithms enable the visualization of ...
Ultrasound images are corrupted by a multiplicative noise, the speckle, which makes high level analysis difficult. Within each resolution cell a number of elementary scatterers re...