This paper concentrates on the comparisons of systems that are used for the recognition of expressions generated by six upper face action units (AU s) by using Facial Action Coding...
—P2P computing platforms are subject to a wide range of attacks. In this paper, we propose a generalisation of the previous disk-less checkpointing approach for fault-tolerance i...
We present an approach for adapted transfer function (TF) specification to highlight pathologic changes of the coronary artery vessel wall based on contrast medium-enhanced compute...
Abstract. Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program monitoring that is particularly appealing for...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
5th International Symposium on Visual Computing, Las Vegas, Nevada, USA, Nov 30 - Dec 2, 2009 The Laplacian pyramid recursively splits an image into local averages and local diff...