— Visual servoing schemes generally employ various image features (points, lines, moments etc.) in their control formulation. This paper presents a novel method for using boundar...
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
This paper describes the design and initial evaluation of Tag-liatelle, a collaborative tagging application for encouraging healthier eating. Users photograph their own meals and ...
Conor Linehan, Mark Doughty, Shaun Lawson, Ben Kir...
— This paper presents a general framework for multi-sensor object recognition through a discriminative probabilistic approach modelling spatial and temporal correlations. The alg...
Abstract. In this paper we introduce a system that automatically summarizes multiple biomedical documents relevant to a question. The system extracts biomedical and general concept...
Zhongmin Shi, Gabor Melli, Yang Wang, Yudong Liu, ...