— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
Abstract--Various 3-D face synthesis techniques have been proposed and extensively used in many applications. Compared with others, single view-based face synthesis technology allo...
Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for comp...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...
Skin detection is employed in tasks like face detection and tracking, naked people detection, hand detection and tracking, people retrieval in databases and Internet, etc. However...
We propose an accurate collision detection algorithm for use in virtual reality applications. The algorithm works for three-dimensional graphical environments where multiple objec...
Yoshifumi Kitamura, Andrew Smith, Haruo Takemura, ...