Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was ...
In this paper, we consider the problem of tracking nonrigid surfaces and propose a generic data-driven mesh deformation framework. In contrast to methods using strong prior models...
Although large displays could allow several users to work together and to move freely in a room, their associated interfaces are limited to contact devices that must generally be s...
In this paper, we present a novel view to home video content analysis, which aims at tracking the capture intention of camcorder users. Based on the study of intention mechanism i...
We motivate an approach to evaluating the utility of synthetic agents that is based on human physiology rather than questionnaires. The primary tool is an eye tracker that provide...
Helmut Prendinger, Chunling Ma, Jin Yingzi, Kushid...