An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A motion estimation algorithm using wavelet approximation as an optical ow model has been developed to estimate accurate dense optical ow from an image sequence. This wavelet moti...
Yu-Te Wu, Takeo Kanade, Jeffrey F. Cohn, Ching-Chu...
We present an efficient multi stage approach to detection of deformable objects in real, cluttered images given a single or few hand drawn examples as models. The method handles de...
If we treated image watermarking as a communication problem using the image as the communication channel, applying error-correcting codes (ECC) to the watermarking system should i...
In modular testing of system-on-a-chip (SoC), test access mechanisms (TAMs) are used to transport test data between the input/output pins of the SoC and the cores under test. Prio...