The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
Active appearance model efficiently aligns objects which are previously modelized in images. We use it for Human Machine Interface (face gesture analysis, lips reading) to modeli...
Yasser Aidarous, Sylvain Le Gallou, Renaud S&eacut...
Nowadays, due to the lack of face-to-face contact, distance course instructors have real difficulties knowing who their students are, how their students behave in the virtual cour...
With rapid development of the Internet, e-learning system has become more and more popular. Currently, to solve the issue of sharing and reusing of teaching materials in different...
Jun-Ming Su, Shian-Shyong Tseng, Chia-Yu Chen, Jui...
Human activity analysis is an important problem in computer
vision with applications in surveillance and summarization
and indexing of consumer content. Complex human
activities...