3D models have many applications, but automatically building a 3D model from a video is a challenge in practice. Many methods exist for outdoor scenes, but indoor scenes are more ...
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Compute clusters are consuming more power at higher densities than ever before. This results in increased thermal dissipation, the need for powerful cooling systems, and ultimatel...
Kirk W. Cameron, Hari K. Pyla, Srinidhi Varadaraja...
Abstract— This paper presents the search problem formulated as a decision problem, where the searcher decides whether the target is present in the search region, and if so, where...
Many real datasets have uncertain categorical attribute values that are only approximately measured or imputed. Uncertainty in categorical data is commonplace in many applications...