Energy efficiency is becoming increasingly important in the operation of networking infrastructure, especially in enterprise and data center networks. While strategies for lowerin...
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
Previous experimental studies of spontaneous imbibition on chalk core plugs have shown that seawater may change the wettability in the direction of more water-wet conditions in cha...
A methodology for the segmentation of successive frames of a video sequence is presented. Traditional methods, treating each frame in isolation, are computationally expensive, ign...
Illumination inconsistencies cause serious problems for classical computer vision applications such as tracking and stereo matching. We present a new approach to model illuminatio...