In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
In this paper, we describe an interface consisting of a virtual showroom where a team of two highly realistic 3D agents presents product items in an entertaining and attractive wa...
Boris Brandherm, Helmut Prendinger, Mitsuru Ishizu...
Context: Service Oriented Architectures (SOA) have emerged as a new paradigm to develop interoperable and highly dynamic applications. Objective: This paper aims to identify the s...
Images of cellular structures in growing plant roots acquired using confocal laser scanning microscopy (CLSM) have some unusual properties that make motion estimation challenging....
Timothy J. Roberts, Stephen J. McKenna, Cheng-Jin ...
Location determination of mobile users within a building has attracted much attention lately due to its many applications in mobile networking including network intrusion detectio...
Yiming Ji, Saad Biaz, Santosh Pandey, Prathima Agr...