There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Abstract. In psychology the ‘A not B’ error, whereby infants perseverate in reaching to the location where a toy was previously hidden after it has been moved to a new location...
: An new object oriented development suite for data fusion is presented. It is shown how the various issues in the data fusion development like design, implementation, simulation a...
Abstract. Piecewise-linear methods accomplish the registration by dividing the images in corresponding triangular patches, which are individually mapped through affine transformati...