This paper presents a novel technique for camera tampering detection. It is implemented in real-time and was developed for use in surveillance and security applications. This meth...
Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos ...
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
Recently, Grid infrastructures have provided wide integrated use of resources. DotGrid intends to introduce required Grid services and toolkits that are implemented as a layer wra...
Alireza Poshtkohi, Ali Haj Abutalebi, Leila Mahmou...
Abstract. In recent years, attention has been paid to particle-based fluid simulation, with several methods being developed to incorporate particle-based simulation into CG animat...
In this work we present a parallel algorithm for the solution of a least squares problem with structured matrices. This problem arises in many applications mainly related to digit...
Pedro Alonso, Antonio M. Vidal, Alexey L. Lastovet...