Assigning the resources of a virtual network to the components of a physical network, called Virtual Network Mapping, plays a central role in network virtualization. Existing appr...
Many parallel systems offer a simple view of memory: all storage cells are addresseduniformly. Despite a uniform view of the memory, the machines differsignificantly in theirmemo...
Detecting mud hazards is a significant challenge to unmanned ground vehicle (UGV) autonomous offroad navigation. A military UGV stuck in a mud body during a mission may need to be...
Motion-based face recognition is a young research topic, inspired mainly by psychological studies on motionbased perception of human faces. Unlike its close relative, appearance-b...
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...