The evolution of the Information and Communication Technology (ICT) and the rapid growth of the Internet have impelled the pervasive diffusion of e-Learning systems. This is a grea...
Maria Claudia Buzzi, Marina Buzzi, Barbara Leporin...
We present a new method for the detection and estimation of multiple directional illuminants, using a single image of any object with known geometry and Lambertian reflectance. W...
A useful function of augmented reality (AR) systems is their ability to visualize occluded infrastructure directly in a user’s view of the environment. This is especially import...
Mark A. Livingston, J. Edward Swan II, Joseph L. G...
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
Statistical approaches for building non-rigid deformable
models, such as the Active Appearance Model (AAM), have
enjoyed great popularity in recent years, but typically require
...
Akshay Asthana (Australian National University), R...