With recent advances in eye tracking technology, eye gaze gradually gains acceptance as a pointing modality. Its relatively low accuracy, however, determines the need to use enlar...
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Metamodels are functions with calibrated parameters, used actions and simplifications of the simulation model. A metamodel exposes the system’s input-output relationship and ca...
Algorithms that use point-cloud models make heavy use of the neighborhoods of the points. These neighborhoods are used to compute the surface normals for each point, mollificatio...
This paper presents a feature-based watermarking scheme which is robust to geometric and common image processing attacks. The improved Harris corner detector is used to find the r...