In recent years the video event understanding is an active research topic, with many applications in surveillance, security, and multimedia search and mining. In this paper we foc...
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Face segmentation has been used in many different applications, such as face tracking, video surveillance in security control system and human computer interface. In this paper we...
Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald...
Maritime assets such as merchant and navy ships, ports, and harbors, are targets of terrorist attacks as evidenced by the USS Cole bombing. Conventional methods of securing maritim...
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...