A new postprocessing method based on adjusted contourlet transform is introduced in this paper for suppressing blocking artifacts (BA) in block-based discrete cosine transform (BD...
Haohao Song, Songyu Yu, Chen Wang, Li Song, Hongka...
A significant fraction of soft errors in modern microprocessors has been reported to never lead to a system failure. Any concurrent error detection scheme that raises alarm every ...
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
- This paper reports on the development of two Tele-Operated High Speed Anthropomorphic Dextrous robotic hands. The aim of developing these hands was to achieve a system that seaml...
P. Y. Chua, M. Bezdicek, Steve Davis, Darwin G. Ca...
We argue that the failure to separate the concerns in CS1 is the leading cause of difficulty in teaching OOP in the first year. We show how the concerns can be detangled and prese...