Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
We present an approach for tracking varying number of objects through both temporally and spatially significant occlusions. Our method builds on the idea of object permanence to r...
In this paper, we consider the problem of lossless compression of video by taking into account temporal information. Video lossless compression is an interesting possibility in th...
Dania Brunello, Giancarlo Calvagno, Gian Antonio M...
The usefulness of a video database relies on whether the video of interest can be easily located. To allow exploring, browsing, and retrieving videos according to their visual con...
Yap-Peng Tan, Sanjeev R. Kulkarni, Peter J. Ramadg...
Recently, increasing attention has focused on exploring brain activity during rest. A current challenge is to ascertain activity patterns without using an external reference. In t...