A scheme to specify planar C2 Pythagorean-hodograph (PH) quintic spline curves by control polygons is proposed, in which the “ordinary” C2 cubic B-spline curve serves as a ref...
Francesca Pelosi, Maria Lucia Sampoli, Rida T. Far...
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
provides a powerful abstraction basically allowing to perceiving all compute resources as entities that can be dynamically discovered and composed. These entities are called servic...
This paper considers arguments for the necessity of embodiment in cognitive vision systems. We begin by delineating the scope of cognitive vision, and follow this by a survey of t...
In the US and many other countries, bank checks are preprinted with the account number and the check number in MICR ink and format; as such, these two numeric fields can be easily...