We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
Transformation of image patches is a common requirement for 2D transition animations such as shape interpolation and image morphing. It is usually done by applying affine transfor...
From an audio perspective, the present state of teleconferencing technology leaves something to be desired; speaker overlap is one of the causes of this inadequate performance. To...
To address performance limitations and expand their applications range, emerging and mature display technologies rely on the design of novel display controllers. Under current mod...
David Antonio-Torres, Paul F. Newbury, Paul F. Lis...
In this paper we present an algorithm to automatically produce artistic drawings from stereo image pairs. The input to the algorithm is a natural scene, along with a user-defined...