The complexity of most virtual environments prevents them being rendered in real time even on modern graphics hardware. Knowledge of the visual system of the user viewing the envi...
Given a user-specified minimum correlation threshold and a market basket database with N items and T transactions, an all-strong-pairs correlation query finds all item pairs with...
Studying program behavior is a central component in architectural designs. In this paper, we study and exploit one aspect of program behavior, the behavior repetition, to expedite...
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
Image registrations have been a subject of extensive study over the last decade. They appear in numerous applications including Computer Vision, Pattern Recognition, Medical Image...