: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
Enhancing volume visualization with additional cues from our sense of touch has shown the potential to increase both speed and accuracy in the data exploration. Research in the ar...
Motion segmentation is an essential process for many computer vision algorithms. During the last decade, a large amount of work has been trying to tackle this challenge, however, p...
- Two fault isolation approaches based on Combinatorial Group Testing (CGT) are presented. Although they both share the basic principle of grouping suspect resources into subgroups...
Rawad N. Al-Haddad, Carthik A. Sharma, Ronald F. D...
During the last decades software architecture has become increasingly important for companies creating competitive product structures. Recently more and more attention has also be...