The book “Safeguards in a world of ambient intelligence” is unique in its kind. It discusses social, economic, legal, technological and ethical issues related to identity, priv...
Modeling human behavior requires vast quantities of accurately labeled training data, but for ubiquitous people-aware applications such data is rarely attainable. Even researchers...
Daniel Peebles, Hong Lu, Nicholas D. Lane, Tanzeem...
The aim of rendezvous in a graph is meeting of two mobile agents at some node of an unknown anonymous connected graph. The two identical agents start from arbitrary nodes in the g...
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
People identification is an essential task for video content analysis in a surveillance system. A good classifier, however, requires a large amount of training data, which may not...