Constructing three-dimensional model from two-dimensional images is an old problem in the area of computer vision. There are many publications and our approach is specifically des...
We show how to extract a contour line (or isosurface) from quadratic elements—specifically from quadratic triangles and tetrahedra. We also devise how to transform the resultin...
David F. Wiley, Henry R. Childs, Benjamin F. Grego...
An increasing number of applications are being developed using distributed object computing middleware, such as CORBA. Many of these applications require the underlying middleware...
Balachandran Natarajan, Aniruddha S. Gokhale, Shal...
The Information Society relies more and more on the co-operation and collaboration of multidisciplinary people who need to communicate and share information. Communication and kno...
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...