This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
Face recognition has great demands in human recognition and recently it becomes one of the most important research areas of biometrics. In this paper, we present a novel layered fa...
Muhammad Imran Razzak, Muhammad Khurram Khan, Khal...
This paper describes a successful integration of the IEEE micromouse competition training programme with regular undergraduate courses at Zhejiang University City College (ZUCC), H...
Future systems will have to support multiple and concurrent dynamic compute-intensive applications, while respecting real-time and energy consumption constraints. With the increase...
Nicolas Ventroux, Alexandre Guerre, Tanguy Sassola...
Identifying the set of resources that are expected to receive the majority of requests in the near future, namely hot set, is at the basis of most content management strategies of...
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Abstract--Nowadays, novel applications, such as personalized e-commerce services, call for cooperation across enterprise boundaries. Service-Oriented-Architecture (SOA) forms a sol...