Autonomous UAV cinematography: A tutorial and a formalized shot-type taxonomy

I Mademlis, N Nikolaidis, A Tefas, I Pitas… - ACM Computing …, 2019 - dl.acm.org
The emerging field of autonomous UAV cinematography is examined through a tutorial for
non-experts, which also presents the required underlying technologies and connections with …

Serverless workflows for containerised applications in the cloud continuum

S Risco, G Moltó, DM Naranjo, I Blanquer - Journal of Grid Computing, 2021 - Springer
This paper introduces an open-source platform to support serverless computing for scientific
data-processing workflow-based applications across the Cloud continuum (ie …

Image processing for materials characterization: Issues, challenges and opportunities

L Duval, M Moreaud, C Couprie… - … conference on image …, 2014 - ieeexplore.ieee.org
This introductory paper aims at summarizing some problems and state-of-the-art techniques
encountered in image processing for material analysis and design. Developing generic …

Transiting Planets Near the Snow Line from Kepler. I. Catalog∗

H Kawahara, K Masuda - The Astronomical Journal, 2019 - iopscience.iop.org
We present a comprehensive catalog of cool (period P≳ 2 yr) transiting planet candidates in
the 4 yr light curves from the prime Kepler mission. Most of the candidates show only one or …

[HTML][HTML] A modified ZS thinning algorithm by a hybrid approach

L Ben Boudaoud, B Solaiman, A Tari - The Visual Computer, 2018 - Springer
Thinning is one of the most important techniques in the field of image processing. It is
applied to erode the image of an object layer-by-layer until a skeleton is left. Several …

Simultaneous encryption and authentication of messages over GPUs

A Fanfakh, H Noura, R Couturier - Multimedia Tools and Applications, 2024 - Springer
There has recently been a rising interest in inventing new efficient cryptographic algorithms,
thanks to advances in the field of Graphics Processing Unit (GPU) technology. Current …

ORSCA-GPU: one round stream cipher algorithm for GPU implementation

A Fanfakh, H Noura, R Couturier - The Journal of Supercomputing, 2022 - Springer
Data confidentiality is one of the most critical security services. Many encryption algorithms
are currently used to provide data confidentiality. That is why there are continuous research …

[HTML][HTML] Efficient and cryptographically secure generation of chaotic pseudorandom numbers on gpu

C Guyeux, R Couturier, PC Héam, JM Bahi - The journal of …, 2015 - Springer
In this paper, we present a new pseudorandom number generator (PRNG) on graphics
processing units (GPU). This PRNG is based on the so-called chaotic iterations. It is firstly …

Advances in distributed computing with modern drug discovery

AJ Banegas-Luna, B Imbernon… - Expert opinion on …, 2019 - Taylor & Francis
Introduction: Computational chemistry dramatically accelerates the drug discovery process
and high-performance computing (HPC) can be used to speed up the most expensive …

[PDF][PDF] Uncertainty quantification with applications to engineering problems

D Bigoni - 2015 - orbit.dtu.dk
The systematic quantification of the uncertainties affecting dynamical systems and the
characterization of the uncertainty of their outcomes is critical for engineering design and …