In this paper, we consider the problem of detecting an intruding packet in a communication network. Detection is accomplished by sampling a portion of the packets transiting selec...
—Based on a study of the engagement process between humans, we have developed and implemented an initial computational model for recognizing engagement between a human and a huma...
Charles Rich, Brett Ponsleur, Aaron Holroyd, Canda...
Many automated programming environments construct software by integrating predefined components from a software library. A fundamental challenge in this process is to match the p...
In this paper, we present a novel fast algorithmfor image retouching. A space-mapping technique is used to transform a missing (or damaged) part of a surface into a different shap...
Vladimir V. Savchenko, Nikita Kojekine, Hiroshi Un...
: This paper illustrates the future role of mobile computing for the response in emergencies and mass casualty incidents (MCIs). Furthermore it describes the different components a...