Estimation of the 3D pose of bones in 2D images plays an important role in computer-assisted diagnosis and surgery. Existing work has focused on registering a 3D model of the bone...
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
The control of overt visual attention relies on an interplay of bottom-up and top-down mechanisms. Purely bottom-up models may provide a reasonable account of the looking behaviors...
Since 1996, the core Use Case Map (UCM) notation has remained remarkably stable. As the structure and intent of workflow and scenario languages are very similar, UCMs have been ap...
Developing network protocols for mobile wireless systems is a complex task, and most of the existing simulator frameworks are not well suited for experimental development. The YAE...