Many rural roads lack sharp, smoothly curving edges and a homogeneous surface appearance, hampering traditional vision-based road-following methods. However, they often have stron...
— Internet worm attacks pose a significant threat to network security. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms...
Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou,...
Estimating the structure of the human face is a long studied and difficult task. In this paper we present a new method for estimating facial structure from only a minimal number o...
Nathan Faggian, Andrew P. Paplinski, Jamie Sherrah
There have been many interpolation methods developed over the years, each with their own problems. One of the biggest limitations in many applications is the non-correspondence of...
— We consider the use of binary proximity sensors for tracking targets. Such sensors provide only 1-bit information regarding a target’s presence or absence in their vicinity, ...
WooYoung Kim, Kirill Mechitov, Jeung-Yoon Choi, So...