The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been repo...
There are some different methods used for depth perception. In this paper, a new method for the depth perception, by using a single camera based on an interpolation, is introduced...
We present new implementations and results for the NAS Parallel Benchmarks 2 suite. The suite currently consists of seven programs. Of these LU, SP, BT, MG and FT have previously ...
William Saphir, Rob F. Van der Wijngaart, Alex Woo...
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
We describe an algorithm for comparing two RNA secondary structures coded in the form of trees that introduces two new operations, called node fusion and edge fusion, besides the t...