Abstract—Traditionally, random access protocols have been designed and studied by assuming simple models for the physical layer. We introduce a reception model that incorporates ...
—In this paper, we present a novel system which combines depth-from-stereo and visual hull reconstruction for acquiring dynamic real-world scenes at interactive rates. First, we ...
Hartmut Schirmacher, Ming Li, Marcus A. Magnor, Ha...
Relational databases provide significant flexibility to organize, store, and manipulate an infinite variety of complex data collections. This flexibility is enabled by the concept...
This paper introduces an immersive virtual reality application that allows users to browse and explore the contents of database systems. We have implemented a visualization metaph...
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...