The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
Face recognition in video has gained wide attention due to its role in designing surveillance systems. One of the main advantages of video over still frames is that evidence accumu...
We investigate the problem of automatically identifying speaking faces for video analysis using only the visual information. Intuitively, mouth should be first accurately located i...
Yi Wu, Wei Hu, Tao Wang, Yimin Zhang, Jian Cheng, ...
The alignment of business processes and their supporting application software is a major concern during the initial software design phases. This paper proposes a design approach a...
Boris Shishkov, Marten van Sinderen, Dick A. C. Qu...
Loop distribution is one of the most useful techniques to reduce the execution time of parallel applications. Traditionally, loop scheduling algorithms are implemented based on pa...