We present a template-based approach to detecting human silhouettes in a specific walking pose. Our templates consist of short sequences of 2D silhouettes obtained from motion cap...
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Accurately estimating the person’s head position and orientation is an important task for a wide range of applications such as driver awareness, meeting analysis and human-robot...
Louis-Philippe Morency, Jacob Whitehill, Javier R....
Software synthesis from a concurrent functional specification is a key problem in the design of embedded systems. A concurrent specification is well-suited for medium-grained part...
In Computer Graphics, Collision Detection is considered a key problem with important applications in related areas. Several solutions have been proposed, but independently of the ...
Lidia M. Ortega, Francisco R. Feito, Clara I. Grim...