' This paper describes a computer accompaniment system capable of providing musical accompaniment for an ensemble of performers. The system tracks the performance of each musi...
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Model-driven engineering is at the forefront among recent attempts to information systems development. Models are gradually refined from domain specific descriptions to more concre...
Christian Flender, Thomas Hettel, Michael Lawley, ...
This paper proposes a method of automated individualization of eye region model. The eye region model has been proposed in past research that parameterizes both the structure and ...
This paper describes a combination of an automated image acquisition method and a probabilistic tracking method for analysis of the 3D microstructure of a sheet of paper. A protot...
Horst Bischof, Johannes Kritzinger, Michael Donose...