—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
—User-level communication allows an application process to access the network interface directly. Bypassing the kernel requires that a user process accesses the network interface...
This paper identifies a novel feature space to address the problem of human face recognition from still images. This is based on the PCA space of the features extracted by a new m...
Visual dictionaries are widely employed in object recognition to map unordered bags of local region descriptors into feature vectors for image classification. Most visual dictiona...
This paper presents the design, implementation, and evaluation of EnviroMic, a novel distributed acoustic monitoring, storage, and trace retrieval system. Audio represents one of ...
Liqian Luo, Qing Cao, Chengdu Huang, Tarek F. Abde...