Abstract--This correspondence addresses the inversion of 3-D transformation fields, which is a problem that typically arises in image warping problems. A topology preserving parame...
Vincent Noblet, Christian Heinrich, Fabrice Heitz,...
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
In the framework of perfect loop nests with uniform dependences, tiling has been extensively studied as a source-to-source program transformation. We build upon recent results by ...
Frederic Desprez, Jack Dongarra, Fabrice Rastello,...
A widely accepted prediction is that computing will move to the background, weaving itself into the fabric of our everyday living spaces and projecting the human user into the for...
Maja Pantic, Alex Pentland, Anton Nijholt, Thomas ...