— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Reliable estimation of visual saliency allows appropriate processing of images without prior knowledge of their content, and thus remains an important step in many computer vision ...
Ming-Ming Cheng, Guo-Xin Zhang, Niloy J. Mitra, Xi...
This paper considers the design of a camera path through a scene. Given a valid set of keyframes for the camera, we want to build a camera path that avoids collisions with the sce...
—A major performance-limiting factor in terrestrial optical wireless (OW) systems is turbulence-induced fading. Exploiting the additional degrees of freedom in the spatial dimens...
Nestor D. Chatzidiamantis, Murat Uysal, Theodoros ...
In this paper we describe a system to reliably localize the position of the speaker’s face and mouth in videophone sequences. A statistical scheme based on a subspace method is p...