— A key step in validating a proposed idea or system is to evaluate over a suitable data set. However, to this date there have been no useful tools for researchers to understand ...
Meiyu Lu, Srinivas Bangalore, Graham Cormode, Mari...
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
We consider transfer of video frames over a time-varying wireless channel. When the channel is good, the transmitter can send frames at a higher rate than the receiver can consume...
Carri W. Chan, John G. Apostolopoulos, Yan Li, Nic...
Tracking and tracing individual items is a new and emerging trend in many industries. Driven by maturing technologies such as Radio-Frequency Identification (RFID) and upcoming s...
Rakesh Agrawal, Alvin Cheung, Karin Kailing, Stefa...
In our poster presentation at ISMAR’04 [11], we proposed the idea of an AR training solution including capture and 3D replays of subtle movements. The crucial part missing for r...