Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
This paper presents a content-based approach for understanding handball videos. Tracked players are characterized by their 2D trajectories in the court plane. The trajectories and...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...
We propose a novel approach for modeling, tracking and recognizing facial expressions. Our method works on a low dimensional expression manifold, which is obtained by Isomap embed...
The essence of the signal-to-symbol problem consists of associating a symbolic description of an object (e.g., a chair) to a signal (e.g., an image) that captures the real object....
Manuela M. Veloso, Paul E. Rybski, Felix von Hunde...
Skeleton is a lower dimensional shape description of an object. The requirements of a skeleton differ with applications. For example, object recognition requires skeletons with pr...