Abstract. A range of attacks on network components, such as algorithmic denial-of-service attacks and cryptanalysis via timing attacks, are enabled by data structures for which an ...
Subspace learning approaches have attracted much attention in academia recently. However, the classical batch algorithms no longer satisfy the applications on streaming data or la...
Jun Yan, Benyu Zhang, Shuicheng Yan, Qiang Yang, H...
We present a search interface for large video collections with time-aligned text transcripts. The system is designed for users such as intelligence analysts that need to quickly f...
Andreas Girgensohn, John Adcock, Matthew L. Cooper...
With the acceleration of technological development we are reaching the point where our systems and their user interfaces become to some degree outdated 'legacy systems' ...
Les Nelson, Elizabeth F. Churchill, Laurent Denoue...
We describe a novel interface that locates and characterizes knocks and taps atop a large glass window. Our current setup uses four contact piezoelectric pickups located near the ...
Joseph A. Paradiso, Che King Leo, Nisha Checka, Ka...