Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
This paper presents a new method for integrating di erent low level vision modules, stereo and shape from shading, in order to improve the 3D reconstruction of visible surfaces of...
Mostafa G.-H. Mostafa, Sameh M. Yamany, Aly A. Far...
: The aim of this study was to demonstrate the effectiveness of an adaptive neuro-fuzzy inference system (ANFIS) for the prediction of diesel spray penetration length in the cylind...
Shaun H. Lee, Robert J. Howlett, Simon D. Walters,...
Multimedia and hypermedia had and still have a tremendous impact on the evolution of educational software. In this paper we propose a platform for the implementation of the servic...
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...