Most of the work on 3-D object recognition from range data has used an alignment-verification approach in which a specific 3-D object is matched to an exact instance of the same o...
Salvador Ruiz-Correa, Linda G. Shapiro, Marina Mei...
Fibonacci Cubes (FCs), together with the enhanced and extended forms, are a family of interconnection topologies formed by diluting links from binary hypercube. While they scale up...
This paper introduces an unsupervised color segmentation
method. The underlying idea is to segment the input
image several times, each time focussing on a different
salient part...
Michael Donoser, Martin Urschler, Martin Hirzer an...
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
In this paper, a programming model is presented which enables scalable parallel performance on multi-core shared memory architectures. The model has been developed for application...