Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
— In this paper, we develop a power distribution scheme for multi-input multi-output (MIMO) [1] multi-carrier (MC) code division multiple access (CDMA) systems [2]-[3] with two-d...
Visual categorization is fundamentally important for autonomous mobile robots to get intelligence such as novel object acquisition and topological place recognition. The main dif...
Shape from silhouette methods are extensively used to model dynamic and non-rigid objects using binary foreground-background images. Since the problem of reconstructing shapes fro...