The notion of blacklisting communication sources has been a well-established defensive measure since the origins of the Internet community. In particular, the practice of compilin...
It is difficult to interact with computer displays that are across the room. A popular approach is to use laser pointers tracked by a camera, but interaction techniques using lase...
Brad A. Myers, Rishi Bhatnagar, Jeffrey Nichols, C...
— We describe an algorithm to estimate the future cell throughput of a multi-rate broadband wireless network based on previous measurements. The total throughput of a cell depend...
Effective and real-time face detection has been made possible by using the method of rectangle Haar-like features with AdaBoost learning since Viola and Jones’ work [12]. In this...
Stimulus selectivity of sensory neurons is often characterized by estimating their receptive field properties such as orientation selectivity. Receptive fields are usually deriv...