While there has been a great deal of research in face detection and recognition, there has been very limited work on identifying the expression on a face. Many current face detect...
Ramana Isukapalli, Ahmed M. Elgammal, Russell Grei...
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
The research community has turned to create Semantic Overlay Networks for information retrieval in large scale peer-to-peer networks. Much research work in semantic overlay protoc...
Location-based applications and services are getting increasingly important for mobile users. They take into account a mobile user's current location and provide a location-d...
We present an algorithm to identify the flat and tubular regions of a three dimensional shape from its point sample. We consider the distance function to the input point cloud an...