Abstract. In adversarial classification tasks like spam filtering, intrusion detection in computer networks and biometric authentication, a pattern recognition system must not only...
Geographic face routing algorithms have been widely studied in the literature [1, 8, 13]. All face routing algorithms rely on two primitives: planarization and face traversal. The...
Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott S...
Dense optical flow fields are required for many applications. They can be obtained by means of various global methods which employ regularization techniques for propagating estimat...
Claudia Kondermann, Daniel Kondermann, Christoph S...
In recent years high quality interaction devices have become very popular in our environment. The industries are also currently undergoing rapid change and various technologies hav...
Nam Woo Kim, Seung Jae Lee, Byung-Gook Lee, Joon-J...
Web service applications integrate explicit client-service interactions with notification-style programming. Such event-driven interactions are often called implicit invocations b...