Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
IAPR Workshop on Machine Vision and Applications, pp. 455-458, 2000, Tokyo, Japan In this paper, we integrate the model-based tracking and local contexture (temporal and spatial) ...
Motion estimation (ME) methods based on differential techniques provide useful information for video analysis, and moreover it is relatively easy to embed into them regularity con...
Marco Cagnazzo, Wided Miled, Thomas Maugey, B&eacu...
When harvesting collective intelligence, a user wishes to maximize the accuracy and value of the acquired information without spending too much time collecting it. We empirically ...
Today, the development of a VR application is still a long and difficult task. You need to be skilled in Virtual Reality (VR) technology to be able to develop a Virtual World. The...
Wesley Bille, Olga De Troyer, Frederic Kleinermann...