An algorithm is presented that enables fast deformation of volumetric objects. Using this algorithm, rigid, deformable, elastic and plastic materials can be modeled by adjusting d...
Abstract. Rule-based packet classification plays a central role in network intrusion detection systems such as Snort. To enhance performance, these rules are typically compiled int...
This paper presents an algorithm that detects and tracks marine vessels in video taken by a non-stationary camera installed on an untethered buoy. 1 The video is characterized by ...
String searching is the computationally intensive kernel of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filter...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
Many photo agencies use the web to sell access to their image collections. Despite significant security measures, images may be stolen and distributed, making it necessary to det...