Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
The Markov chain approximation method is an effective and widely used approach for computing optimal values and controls for stochastic systems. It was extended to nonlinear (and p...
Segmentation is one of the first and most integral pre-processing steps for any Fingerprint Recognition System. It is used to identify the region of interest within an image. Perf...
We present a method aimed at monitoring access to interlocks and secured entrance areas, which deploys two views in order to robustly perform intrusion detection and singularizati...
Luigi di Stefano, Federico Tombari, Stefano Mattoc...
Watermark perceptibility and robustness must be ensured in order to enhance the practicality of digital watermarking. Taking human visual system characteristics into account fully...