There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Within a human motion analysis system, body parts are modeled by simple virtual 3D rigid objects. Its position and orientation parameters at frame t + 1 are estimated based on the ...
The advance of computing technology has provided the means for building intelligent vehicle systems. Drowsy driver detection system is one of the potential applications of intellig...
The design of usable haptic icons (brief informational signals delivered through the sense of touch) requires a tool for measuring perceptual distances between icons that will be ...
Intensive computations required for sensing and processing perceptual information can impose significant burdens on personal computer systems. We explore several policies for sel...