In this paper we propose a novel method of applying motion estimation techniques to human authentication by iris matching. By exploiting the inherent differences in vector fields ...
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
A regularization-based approach to 3-D reconstruction from multiple images is proposed. As one of the most widely used multiple-view 3-D reconstruction algorithms, Space Carving c...
When failures occur in Internet overlay connections today, it is difficult for users to determine the root cause of failure. An overlay connection may require TCP connections bet...
We present methods for inferring the cost of interrupting users based on multiple streams of events including information generated by interactions with computing devices, visual ...