—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X) and address space layout randomization (ASLR) are typically used in combination. T...
Giampaolo Fresi Roglia, Lorenzo Martignoni, Robert...
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Multi-observer segmentation evaluation is useful in the imaging community. We have developed a web-based software application for automatic performance evaluation of multiple imag...
Yaoyao Zhu, Xiaolei Huang, Daniel P. Lopresti, L. ...
This paper focuses on confidence scores for use in acoustic model adaptation. Frame-based confidence estimates are used in linear transform (CMLLR and MLLR) and MAP adaptation. ...
— An image-based visual servo control is presented for an Unmanned aerial vehicle (UAV) capable of stationary or quasi-stationary flight. The proposed control design addresses v...