A method is presented to rapidly incorporate real objects into virtual environments using laser scanned 3D models with color-based marker tracking. Both the real objects and their...
Xiyong Wang, Aaron Kotranza, John Quarles, Benjami...
The work we present here is mainly concerned with interagent communication, MAS communication protocols and, in particular, software tools and environments to define, experiment a...
This paper describes one method for identifying global variables in Ada procedures and adding them to the parameter list of appropriate procedures. Global variables, ones that are...
This paper presents a novel face recognition method based on cascade Linear Discriminant Analysis (LDA) of the component-based face representation. In the proposed method, a face i...
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...