Constructing three-dimensional model from two-dimensional images is an old problem in the area of computer vision. There are many publications and our approach is specifically des...
A comparison of several approaches that use graph matching and cascade filtering for landmark localisation in 3D face data is presented. For the first method, we apply the structur...
The results of a study of two computer games, that use human movement as direct input, were analysed using four existing frameworks and approaches, drawn from different disciplines...
Lian Loke, Astrid Twenebowa Larssen, Toni Robertso...
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Abstract. Choreography and orchestration languages deal with business processes design and specification. Referring to Web Services technology, the most credited proposals are WS-...