Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
In this paper, we present an improvement to the minimum error boundary cut, a method of shaping texture patches for nonparametric texture synthesis from example algorithms such as...
Recently, we have presented a comic generating system that visualizes an online-game play. Our system was inspired by a former work of Shamir et al. However, comics generated in th...
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
This paper presents a technique to learn dynamic appearance models from a small number of training frames. Under this framework, dynamic appearance is modelled as an unknown opera...