We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Source code investigation is one of the most time consuming activities during software maintenance and evolution, yet currently available tool support suffers from several shortco...
In signal processing, the approach of the analytic signal is a capable and often used method. For signals of finite length, quadrature filters yield a bandpass filtered approxim...
We propose to incorporate a priori geometric constraints in a 3?D stereo reconstruction scheme to cope with the many cases where image information alone is not sufficient to accur...
Abstract— Recent research has shown that forwarding speculative data to other processors before it is requested can improve the performance of multiprocessor systems. The most re...