—The selection of a path in a network from one node to another is performed by a routing protocol, often using the shortest path approach. However, it has been shown that in wire...
Winston Khoon Guan Seah, Alvin C. Valera, Pius W. ...
In Virtual Environments (VE), users are often facing tasks that involve direct manipulation of virtual objects at close distances, such as touching, grabbing, placement. In immers...
Andrei Sherstyuk, Arindam Dey, Christian Sandor, A...
Compositing is one of the most commonly performed operations in computer graphics. A realistic composite requires adjusting the appearance of the foreground and background so that...
Su Xue, Aseem Agarwala, Julie Dorsey, Holly E. Rus...
We address the problem of multi-person dataassociation-based tracking (DAT) in semi-crowded environments from a single camera. Existing trackletassociation-based methods using pur...
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...