Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
— This paper presents topology-based methods to robustly extract, analyze, and track features defined as subsets of isosurfaces. First, we demonstrate how features identified b...
Peer-Timo Bremer, Gunther H. Weber, Valerio Pascuc...
—We consider surveillance applications in which sensors are deployed in large numbers to improve coverage fidelity. Previous research has studied how to select active sensor cov...
This paper investigates the feasibility of person identification based on feature points extracted from palmprint images. Our approach first extracts a set of feature points along...
The paper proposes a novel distributed service discovery method for the pervasive computing environment. The method is based on the concept of small world, policy-based advertiseme...