We consider the privacy problem in data publishing: given a database instance containing sensitive information “anonymize” it to obtain a view such that, on one hand attackers...
In this paper, we address the problem of finding depth from defocus in a fundamentally new way. Most previous methods have used an approximate model in which blurring is shift in...
Scott McCloskey, Michael S. Langer, Kaleem Siddiqi
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Wearable technology is omnipresent to the user. Thus, it has the potential to be significantly disruptive to the user’s daily life. Context awareness and intuitive device interf...
Lucy E. Dunne, Sarah Brady, Richard Tynan, Kim Lau...
Hand detection and tracking play important roles in human computer interaction (HCI) applications, as well as surveillance. We propose a self initializing and self correcting trac...