Synchronization protocols based on “dead-reckoning” are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair advantages by essen...
This paper presents an approach to help speed up and unify the exploration and analysis of time-dependent, volumetric data sets by easily incorporating new qualitative and quantit...
Eric J. Griffith, Michal Koutek, Frits H. Post, T....
We present Transitive Closure based visual word formation technique for obtaining robust object representations from smoothly varying multiple views. Each one of our visual words ...
— With the invention of high throughput methods, researchers are capable of producing large amounts of biological data. During the analysis of such data, the need for a functiona...
Very deep submicron and nanometer technologies have increased notably integrated circuit (IC) sensitiveness to radiation. Soft errors are currently appearing into ICs working at e...