Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
We introduce linear methods for model-based tracking of nonrigid 3D objects and for acquiring such models from video. 3D motions and flexions are calculated directly from image in...
Systems that provide ground movement management at airports, maintaining ground safety and increasing air traffic capacity, are called A-SMGCS (Advanced Surface Movement Guidance a...
A large number of methods for circle detection has been studied in the last years for numerous image processing applications. The application domain considered in this paper is th...
This work is motivated by the strong demand of reliability enhancement over flash memory. Our objective is to improve the endurance of flash memory with limited overhead and witho...