Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
Abstract— Ultra wideband technology shows promise for precision ranging due to its fine time resolution to resolve multipath fading and the presence of lower frequencies in the ...
The development and evaluation of haptic rendering algorithms presents two unique challenges. Firstly, the haptic information channel is fundamentally bidirectional, so the output...
Emanuele Ruffaldi, Dan Morris, Timothy Edmunds, Fe...
Object technology was first created in 1967, but it had to wait till the mid 80’s for widespread acceptance and adoption. We observe that that was not the only hiatus for the te...
— The Active Apearence Models (AAM) are often used in Man-Machine Interaction for their ability to align the faces. We propose a new normalization method for AAM based on distanc...
Denis Giri, Maxime Rosenwald, Benjamin Villeneuve,...