We describe a new computational approach to stylize the colors of an image by using a reference image. During processing, we take characteristics of human color perception into ac...
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Developing multi-agent simulations seems to be rather straight forward, as active entities in the original correspond to active agents in the model. Thus plausible behaviors can be...
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
Current high-speed packet switching systems, ATM in particular, have large port buering requirements. The use of highly integrated ASIC technology for implementing high-degree an...