Much work has been done on the development of laser pointers as interaction devices. Typically a camera captures images of a display surface and extracts a laser pointer dot locat...
Benjamin A. Ahlborn, David Thompson, Oliver Kreylo...
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Recently, significant advances have been made in formalised mathematical texts for large, demanding proofs. But although such large developments are possible, they still take an i...
We describe and compare three probabilistic ways to perform Content Based Image Retrieval (CBIR) in compressed domain using images in JPEG2000 format. Our main focus are arbitrary ...
Many approaches have been pursued over the years to facilitate creating, organizing, and sharing collections of materials extracted from large information spaces. Little attention...
Pratik Dave, Paul Logasa Bogen II, Unmil Karadkar,...