Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Abstract. Until now, the great majority of research in low-power systems has assumed a convex power model. However, recently, due to the confluence of emerging technological and ar...
Ani Nahapetian, Foad Dabiri, Miodrag Potkonjak, Ma...
Variational methods are very popular for optic flow computation: They yield dense flow fields and perform well if they are adapted such that they respect discontinuities in the ...
The automation and speedup of interventional therapy and diagnostic workflows is a crucial issue. One way to improve these workflows is to accelerate the image acquisition procedur...
Christian Schaller, Christopher Rohkohl, Jochen Pe...
In this article a robust and real-time hand gesture detection and recognition system for dynamic environments is proposed. The system is based on the use of boosted classifiers for...
Hardy Francke, Javier Ruiz-del-Solar, Rodrigo Vers...