With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
In this work we compute the similarity of 3D faces using a set of eight contour curves. These contours were selected and matched using our 3D face matching framework. In previous ...
Abstract. In this paper we present a method suitable to be used for human tracking as a temporal prior in a particle filtering framework such as CONDENSATION [5]. This method is f...
This paper addresses the problem of classifying human actions in a video sequence. A representation eigenspace approach based on the PCA algorithm is used to train the classifier...
Carlo Colombo, Dario Comanducci, Alberto Del Bimbo
Commercial, non-profit and public organizations are accumulating huge amounts of electronically available text documents. Although composed of unstructured texts, documents contai...