In this paper a new method for the combination of 2D GIS vector data and 2.5D DTM represented by triangulated irregular networks (TIN) to derive integrated triangular 2.5D object-b...
Abstract. The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. The ability to efficiently verify all (or some...
This paper deals with a recently proposed nonparametric approach to camera calibration, which is applicable to any type of sensor design. Currently, no relative quantitative perfo...
In this paper, an improved approach to blind deconvolution of LTI systems incorporating phase unwrapping is presented. The method can recover a noise-free estimate of the logarith...
Abstract. This paper discusses schema evolution in software engineering databases. After a study of existing approaches, we show that these approaches do not satisfy software engin...