We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Research performed in the field of computer vision has steadily ignored recent advances in programming tools and techniques, relying on well-established traditional methods, such ...
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
Over the last decade numerous Active Queue Management (AQM) schemes have been proposed in the literature. Many of these studies have been directed towards improving congestion con...
The quality of a 3D volume visualization heavily depends on a representative transfer function which is responsible for mapping the original density values to color and opacity. F...
Bernhard Reitinger, Christopher Zach, Alexander Bo...