The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
The use of sub-optimal digital systems can at times lead to high speed, efficient, costeffective structures that are sufficient to perform needed tasks. We describe here a system ...
The ever growing size and complexity of both technical and business systems requires efficient software engineering approaches to keep development cost under control while still ...
An important aspect in the development of dependable software is to decide where to locate mechanisms for efficient error detection and recovery. We present a comparison between ...
In order to achieve both fast tracking and accurate object extraction, we present in this paper an original real-time active contour method, incorporating different feature maps i...
Joanna I. Olszewska, Christophe De Vleeschouwer, B...