We present a simple technique to improve the perception of an object's shape. Bump mapping is well known in the computer graphics community for providing the impression of sm...
This paper presents an approach for building consensus ontologies from the individual ontologies of a network of socially interacting agents. Each agent has its own conceptualizat...
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
This paper describes a novel system for 3D head tracking under partial occlusion from 2D monocular image sequences. In this system, The Extended Superquadric (ESQ) is used to gene...
Models are widely used for communication and documentation purposes. They also tend to be used as parameters for code generation. Because these models have to be complete, consist...