Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
This paper presents a framework to simultaneously segment and track multiple body parts of interacting humans in the presence of mutual occlusion and shadow. The framework uses mu...
In this paper, we consider the optimality of beamforming for achieving the ergodic capacity of multiple-input multiple-output (MIMO) multiple access channel (MAC) via virtual repre...
Abstract. This paper presents an algorithm for the estimation of multiple regions with unknown shapes and positions using multiple active contour models (ACM’s). The algorithm or...
We present a utility-driven rationality and a complementary-driven rationality based model, relative to multiple partner coalitions, motivated by relations of dependence and instru...