This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
In this paper, we present a novel approach for extracting silhouettes by using a particular pattern that we call the random pattern. The volume intersection method reconstructs th...
This paper presents a new approach for generation of superresolution stereoscopic and multi-view video from monocular video. Such multi-view video is used for instance with multi-...
People enacting processes deviate from the process definition for a variety of different reasons, the consequences of which may be either positive or negative. Detecting deviation...
— Power-management approaches have been widely studied in an attempt to conserve idling energy by allowing nodes to switch to a low-power sleep mode. However, due to the inherent...
Cigdem Sengul, Albert F. Harris III, Robin Kravets