In this paper a novel non-linear subspace method for face verification is proposed. The problem of face verification is considered as a two-class problem (genuine versus imposto...
Despite its support of prioritized services, the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) cannot guarantee strict QoS required by real-time services such as voice a...
In this paper we present a novel image-based 3D surface reconstruction technique that incorporates both reflectance and polarisation features into a variational framework. Our tec...
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...
This paper studies mobile-generated traffic distributions in mobile ATM networks and evaluates the performance of path rerouting algorithms for handoff control. In mobile ATM netwo...