Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
In augmented reality applications, tracking and registration of both cameras and objects is required because, to combine real and rendered scenes, we must project synthetic models...
Ali Shahrokni, Luca Vacchetti, Vincent Lepetit, Pa...
Accurate registration between real and virtual objects is crucial for augmented reality applications. Existing tracking methods are individually inadequate: magnetic trackers are ...
Andrei State, Gentaro Hirota, David T. Chen, Willi...
One of methods achieving Mixed Reality (MR) displays is the texture projection method using projectors. Another kind of emerging information environments is a wearable information...