Virtualization has been rapidly expanding its applications in numerous server and desktop environments to improve the utilization and manageability of physical systems. Such prolif...
Abstract-- We propose a new method for automatically accessing an internet database of 3D models that are searchable only by their user-annotated labels, for using them for vision ...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
—In this work, we investigate eye movement analysis as a new sensing modality for activity recognition. Eye movement data were recorded using an electrooculography (EOG) system. ...
Andreas Bulling, Jamie A. Ward, Hans Gellersen, Ge...
: Along with the emergence of the Web 2.0, E-learning more often takes place in open environments such as wikis, blogs, and resource sharing platforms. Nowadays, many companies dep...
Rafael Schirru, Stephan Baumann, Martin Memmel, An...