In this paper, we look at the application of the DiCoT methodology [4] to the analysis of a mobile healthcare setting. While the methodology includes a set of principles and theme...
To recognize people by their gait from a sequence of images, we have proposed a statistical approach which combined eigenspace transformation (EST) with canonical space transforma...
Researchers at the National Institute of Standards and Technology have proposed the development of neutral libraries of simulation components. The availability of such libraries w...
We propose novel gaze control algorithms for active perception in mobile autonomous agents with directable, foveated vision sensors. Our agents are realistic artificial animals, o...
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...