Abstract. Table constraints play an important role within constraint programming. Recently, many schemes or algorithms have been proposed to propagate table constraints or/and to c...
In this paper, the principle of facial animation compatible with the MPEG-4 standard is introduced. Then the algorithm of calculating the displacements of face mesh vertices withi...
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Abstract. For real time object recognition and tracking often color-based methods are used. While these methods are very efficient, they usually dependent heavily on lighting cond...
Thilo Weigel, Dapeng Zhang 0002, Klaus Rechert, Be...
Abstract. Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques...