Multi-target tracking requires locating the targets and labeling their identities. The latter is a challenge when many targets, with indistinct appearances, frequently occlude one...
Peter Nillius, Josephine Sullivan, Stefan Carlsson
This paper presents a method for alignment of images acquired by sensors of di erent modalities (e.g., EO and IR). The paper has two main contributions: (i) It identi es an approp...
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
Abstract— Network monitoring and diagnosis are key to improving network performance. The difficulties of performance monitoring lie in today’s fast growing Internet, accompani...
measured together with upper-body and hand motion. This data would be used to create a truly “immersive”, tetherless musical environment, where any kind of body motion would be...
Joseph A. Paradiso, Craig Abler, Kai-yuh Hsiao, Ma...