This paper describes how to automatically extract the presence and location of geometrical irregularities on a surface of revolution. To this end a partial 3D scan of the workpiec...
Kasper Claes, Thomas P. Koninckx, Herman Bruyninck...
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
In video surveillance projects, automatic and realtime event detection solutions are required to guarantee an efficient and cost-effective use of the infrastructure. Many solution...
Francesco Ziliani, Sergio A. Velastin, Fatih Porik...
The building blocks are common structures of high-quality solutions. Genetic algorithms often assume the building-block hypothesis. It is hypothesized that the high-quality solutio...