Road sign identification in images is an important issue, in particular for vehicle safety applications. It is usually tackled in three stages: detection, recognition and trackin...
Rachid Belaroussi, Philippe Foucher, Jean-Philippe...
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
We present a proof of concept system to represent and reason about hockey play. The system takes as input player motion trajectory data tracked from game video and supported by kn...
This work achieves an efficient acquisition of scenes and their depths along streets. During the movement of a vehicle, a slit in the camera frame is set properly to sample scenes...
Advances in computer processing power and emerging algorithms are allowing new ways of envisioning Human Computer Interaction. This paper focuses on the development of a computing...
Zhihong Zeng, Jilin Tu, Brian Pianfetti, Ming Liu,...