In this paper, we propose a new method for simultaneously estimating the illumination of the scene and the reflectance property of the object from a single image. We assume that t...
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Teaching software modeling and software design presents a different and difficult set of problems than teaching some of the other aspects of software engineering such as testing a...
This paper describes an algorithm which calculates the approximate head pose of partially occluded faces without training or manual initialization. The presented approach works on...
This paper proposes an efficient method to analyze worst case interruption delay (WCID) of a workload running on modern microprocessors using a cycle accurate simulator (CAS). Our...