The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency...
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D....
Many engineers are still reluctant to adopt advanced object-oriented technologies (such as high modularity, dynamic binding, automatic garbage collection, etc.) for embedded syste...
Appropriate clustering of objects into pages in secondary memory is crucial to achieving good performance in a persistent object store. We present a new approach, termed semantic ...
This paper describes a hybrid optical-inertial tracking technology for fully-immersive projective displays. In order to track the operator, the operator wears a 3DOF commercial in...
A. R. Hogue, Michael R. M. Jenkin, Robert S. Allis...
Abstract. This paper describes Pittsburgh Pattern Recognition's participation in the face detection and tracking tasks for the CLEAR 2006 evaluation. We first give a system ov...