In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). Current software-based NIDS are too compute intensive and can not ...
We present an algorithm for the real-time detection and interpretation of pointing gestures, performed with one or both arms. The pointing gestures are used as an intuitive tracki...
In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
Much attention has been given to CONDENSATION methods for mobile robot localization. This has resulted in somewhat of a breakthrough in representing uncertainty for mobile robots....
Patric Jensfelt, David J. Austin, Olle Wijk, Magnu...
Cross-sectional pmfiles of medieval mouldings are often considered to be a vital form of data to Art Historians. Mouldings were often used to highlight salient areas of buildings,...