Based on qualitative analysis of three groups collaborating on a research task in a distributed setting, we identify four breakdowns in creativity: (1) Minority ideas were under-c...
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Abstract. Active Shape Models are commonly used to recognize and locate different aspects of known rigid objects. However, they require an off-line learning stage, such that the ex...
Michael Fussenegger, Peter M. Roth, Horst Bischof,...
Abstract. The paper introduces a reinforcement learning-based methodology for performance improvement of Intelligent Controllers. The translation interfaces of a 3-level Hierarchic...
In cache based multiprocessors a protocol must maintain coherence among replicated copies of shared writable data. In delayed consistency protocols the effect of out-going and in-...