Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
Implementing a built-in self-test by a "test per clock" scheme offers advantages concerning fault coverage, detection of delay faults, and test application time. Such a ...
In this paper we present an OCR validation module, implemented for the System for Preservation of Electronic Resources (SPER) developed at the U.S. National Library of Medicine.1 ...
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
This paper presents a multi-frame data association algorithm for tracking multiple targets in video sequences. Multi-frame data association involves finding the most probable corr...