Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Near-regular texture (NRT), denoting deviations from otherwise symmetric wallpaper patterns, is commonly observable in the real world. Existing lattice detection algorithms captur...
Brian A. Canada, Georgia K. Thomas, Keith C. Cheng...
Abstract— We examine the problem of parallelizing the inferencing process for OWL knowledge-bases. A key challenge in this problem is partitioning the computational workload of t...
Abstract. Although there are numerous publications on amygdala volumetry, so far there has not been many studies on modeling local amygdala surface shape variations in a rigorous f...
Moo K. Chung, Brendon M. Nacewicz, Shubing Wang, K...
This paper presents a complete framework for creating a speechenabled avatar from a single image of a person. Our approach uses a generic facial motion model which represents defo...