other projects in the database. Software development data is highly variable, which often result,s in underlying trends being hidden. In order to address this problem, a method of ...
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang,...
Research at the Computer Vision Laboratory at the University of Maryland has focussed on developing algorithms and systems that can look at humans and recognize their activities i...
Larry S. Davis, Vasanth Philomin, Ramani Duraiswam...
In this paper we describe a multi-modal ear and face biometric system. The system is comprised of two components: a 3D ear recognition component and a 2D face recognition componen...
Validation and method of comparison for segmentation of magnetic resonance images (MRI) presenting pathology is a challenging task due to the lack of reliable ground truth. We prop...