— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
Abstract. The branching pattern and geometry of coronary microvessels are of high interest to understand and model the blood flow distribution and the processes of contrast invasi...
H. E. Bennink, Hans C. van Assen, Geert J. Streeks...
Bit-depth reduction in digital displays results in false contours in the image. Moreover some of video enhancement processing in the digital TV display, such as histogram equaliza...
Abstract. Some recent works have addressed the object recognition problem by representing objects as the composition of independent image parts, where each part is modeled with “...
In this paper, we propose the wireframe representation of nD object, which is a single 2D line drawing. A wireframe model of an nD object is composed of a set of edges connecting a...
Hongbo Li, Quan Wang, Lina Zhao, Ying Chen, Lei Hu...