Path planning and trajectory design for autonomous underwater vehicles (AUVs) is of great importance to the oceanographic research community because automated data collection is b...
Ryan N. Smith, Yi Chao, Peggy Li, David A. Caron, ...
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
■ Persuasion is at the root of countless social exchanges in which one person or group is motivated to have another share its beliefs, desires, or behavioral intentions. Here, w...
Emily B. Falk, Lian Rameson, Elliot T. Berkman, Be...
The COTESYS cluster of excellence1 investigates cognition for technical systems such as vehicles, robots, and factories. Cognitive technical systems (CTS) are information processi...
— This paper describes the large-scale experimental results from the Face Recognition Vendor Test (FRVT) 2006 and the Iris Challenge Evaluation (ICE) 2006. The FRVT 2006 looks at...
P. Jonathon Phillips, W. Todd Scruggs, Alice J. O'...