In this paper, we address the problem of learning compact, view-independent, realistic 3D models of human actions recorded with multiple cameras, for the purpose of recognizing th...
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes...
Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliv...
Abstract. The branching pattern and geometry of coronary microvessels are of high interest to understand and model the blood flow distribution and the processes of contrast invasi...
H. E. Bennink, Hans C. van Assen, Geert J. Streeks...
Nowadays, more Virtual Environments (VEs) are becoming available on the Web. This means that VEs are becoming accessible to a larger and more diverse audience. It also means that i...
Frederic Kleinermann, Olga De Troyer, Christophe C...
3D imaging is a popular method for acquiring accurate models for a variety of applications. However, the size of the geometric features that can be modeled in this manner is depen...