We present two methods for lossy compression of normal vectors through quantization using "base" polyhedra. The first revisits subdivision-based quantization. The second...
Abstract. From the echoes of their vocalisations bats extract information about the positions of reflectors. To gain an understanding of how target position is translated into neu...
Bertrand Fontaine, Herbert Peremans, Benjamin Schr...
This paper presents a novel implementation of a patient fall detection system that may be used for patient activity recognition and emergency treatment. Sensors equipped with accel...
: A new code sign implementation of vector median rational hybrid filter based on efficient hardware/software implementation is introduced and applied to colour image filtering pro...
Anis Boudabous, Ahmed Ben Atitallah, Lazhar Khriji...
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...