We present a real-time algorithm to estimate the 3D
pose of a previously unseen face from a single range im-
age. Based on a novel shape signature to identify noses in
range ima...
Regular expressions are widely used in Network Intrusion Detection System (NIDS) to represent patterns of network attacks. Since traditional software-only NIDS cannot catch up to ...
We present a novel approach to ray tracing execution on commodity graphics hardware using CUDA. We decompose
a standard ray tracing algorithm into several data-parallel stages tha...
Recent advances in genotyping technology have led to the generation of an enormous quantity of genetic data. Traditional methods of statistical analysis have proved insufficient i...
Emily Rose Holzinger, Carrie C. Buchanan, Scott M....
A closed-loop contaminant plume monitoring system is being developed that integrates wireless sensor network based monitoring with numerical models for subsurface plumes. The syst...
Qi Han, Anura P. Jayasumana, Tissa H. Illangasekar...