Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
We propose a novel scheme to detect human actions in active video. Active videos such as movies or sports broadcasting are taken purposively by “clever” photographers. They ar...
— Recurrent networks and hardware analogs that perform a winner-take-all computation have been studied extensively. This computation is rarely demonstrated in a spiking network o...
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
We study the problem of affective content analysis. In this paper we think of affective contents as those video/audio segments, which may cause an audience’s strong reactions or...