Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
Many human action recognition tasks involve data that can be factorized into multiple views such as body postures and hand shapes. These views often interact with each other over ...
We present a system for the estimation of unconstrained
3D human upper body movement from multiple cameras.
Its main novelty lies in the integration of three components:
single-...
This paper presents an approach for modeling landmark sites such as the Statue of Liberty based on large-scale contaminated image collections gathered from the Internet. Our system...
Xiaowei Li, Changchang Wu, Christopher Zach, Svetl...
An approach to the deformable registration of three-dimensional brain tumor images to a normal brain atlas is presented. The approach involves the integration of three components:...