The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
We design and implement an intensity-modulated radiation therapy (IMRT) plan generation technology that effectively and efficiently optimizes beam geometry as well as beam intens...
Shabbir Ahmed, Ozan Gozbasi, Martin W. P. Savelsbe...
Software available at http://disi.unitn.it/~uijlings or http://koen.me/research/
For object recognition, the current state-of-the-art is based on exhaustive search. However, to ...
A problem when working with optical satellite or airborne images is the need to compensate for changes in the illumination conditions at the time of acquisition. This is particula...
Pedro Latorre Carmona, Jose Moreno, Filiberto Pla,...
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...