Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
A lot of attention has been given to network quality of service and efforts to make layers on top of the network also QoS-aware increase noticeably. This paper explores QoS-aware s...
Ing Widya, R. E. Stap, L. J. Teunissen, B. Frank H...
This paper presents a solution to the problem of tracking people within crowded scenes. The aim is to maintain individual object identity through a crowded scene which contains com...
In this paper, we present an e cient algorithm for contact determination between spline models. We make use of a new hierarchy, called ShellTree, that comprises of spherical shell...
Shankar Krishnan, M. Gopi, Ming C. Lin, Dinesh Man...
Light fields are known for their potential in generating 3D reconstructions of a scene from novel viewpoints without need for a model of the scene. Reconstruction of novel views, ...
Adam Bowen, Andrew Mullins, Roland G. Wilson, Nasi...