Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Handshape is a key linguistic component of signs, and thus, handshape recognition is essential to algorithms for sign language recognition and retrieval. In this work, linguistic ...
Ashwin Thangali, Stan Sclaroff, Carol Neidle, Joan...
Is happiness contagious online? To answer this question, this paper investigates the posting behavior of users on Twitter.com, a popular online service for sharing short messages....
In this paper, a no reference bit stream model for quality assessment of SD and HD H.264/AVC video sequences based on packet loss visibility is proposed. The method considers the ...
Savvas Argyropoulos, Alexander Raake, Marie-Neige ...
Canonical distributed quantization schemes do not scale to large sensor networks due to the exponential decoder storage complexity that they entail. Prior efforts to tackle this i...