We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...
The instantaneous three-dimensional velocity field of a moving surface can be computed from a sequence of dense range data sets. Here we discuss the computation of the underlying...
This paper presents a fast localisation algorithm for autonomous mobile agents in dynamic environments based on the definition of a new very small sized landmark type. These landm...
Cristina Urdiales, Antonio Bandera, R. Ron, Franci...
This paper describes a.n automatic procedure for extracting sulcal bottom lines from MR (magnetic resonance) images of the human brain, which will serve as a tool for landmark extr...
Gabriele Lohmann, Frithjof Kruggel, D. Yves von Cr...
Abstract. We present a method for 3D object modeling and recognition which is robust to scale and illumination changes, and to viewpoint variations. The object model is derived fro...