Abstract: This paper studies a target-defense game played between a slow defender and a fast attacker. The attacker wins the game if it reaches the target while avoiding the defender's capture disk.
Abstract: Several studies showed that misuses of cryptographic APIs are common in real-world code (e.g., Apache projects and Android apps). There exist several open-sourced and commercial security ...
Abstract: The Remote Procedure Call (RPC) is commonly used for inter-process communications over network, allowing a program to invoke a procedure in another address space, even in another machine as ...
Abstract: An increase in ICT devices and services has led to a rise in carbon emissions. As a result, there is a growing demand for energy-efficient software; however, this demand remains unmet due to ...
Abstract: Point cloud denoising is a challenging task due to the high-dimensional nature of data. To remove the compression artifact in the point cloud, this letter presents a static point cloud color ...
Abstract: Various real-time methods for capturing and transmitting dynamic 3D spaces have been proposed, including those based on RGB-D cameras and volumetric capture. However, applying existing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results