We try to understand the basics of human image processing from a gist recognition per-7 spective. Because the gist is only a subset of the image's information, we think that ...
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Tolerancing decisions can profoundly impact the quality and cost of electro-mechanical assemblies. Existing approaches to tolerance analysis and synthesis in design entail detailed...
Rachuri Sudarsan, Y. Narahari, Kevin W. Lyons, Ram...
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
This paper provides an intelligent multiagent approach to incorporate human temperaments into the filtering process of an information recommendation service. Our approach is to de...