Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
We present a new rigging and skinning method which uses a database of partial rigs extracted from a set of source characters. Given a target mesh and a set of joint locations, our...
Emergencies happen frequently and handling them effectively is necessary. In many cases, emergencies are treated by a static procedure, without considering the requirements of th...
Abstract--In the context of a project aimed at the development of a cooperative and distributed Authoring System to facilitate the production, sharing, and integration of new and e...
Giuseppe Rizzo, Biagio Meirone, Pierluigi Di Nunzi...
Small mobile robots typically have little on-board processing power for time-consuming vision algorithms. Here we show how they can quickly extract very dense yet highly useful inf...