An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Any automated decision support software must tailor its actions or recommendations to the preferences of different users. Thus it requires some representation of user preferences ...
A general framework simultaneously addressing pose
estimation, 2D segmentation, object recognition, and 3D
reconstruction from a single image is introduced in this
paper. The pr...
In this paper, we present a novel approach to robust skeleton extraction. We use undirected graphs to model connectivity of the skeleton points. The graph topology remains unchang...
—We present the Hermite radial basis function (HRBF) implicits method to compute a global implicit function which interpolates scattered multivariate Hermite data (unstructured p...