In the past decades linear scale-space theory was derived on the basis of various axiomatics. In this paper we revisit these axioms and show that they merely coincide with the foll...
Alfons H. Salden, Bart M. ter Haar Romeny, Max A. ...
Software-based self-test (SBST) is emerging as a promising technology for enabling at-speed testing of high-speed embedded processors testing in an SoC system. For SBST, test rout...
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
: Along with the emergence of the Web 2.0, E-learning more often takes place in open environments such as wikis, blogs, and resource sharing platforms. Nowadays, many companies dep...
Rafael Schirru, Stephan Baumann, Martin Memmel, An...