— In this paper, the use of active illumination is extended to image segmentation, specifically in the case of overlapping particles. This work is based on Multi-Flash Imaging (M...
Tze Ki Koh, Nicholas Miles, Steve Morgan, Barrie H...
Various traffic engineering techniques are used to control the flow of IP packets inside large ISP networks. However, few techniques have been proposed to control the flow of pack...
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
This paper presents Daisy, a scalable all-optical packet network where each node is equipped with one wavelength-tunable transmitter and one fixed-wavelength receiver. Network sca...
Marco Ajmone Marsan, Andrea Fumagalli, Emilio Leon...
A prerequisite for all higher level information extraction tasks is the identication of unknown names in text. Today, when large corpora can consist of billions of words, it is of...