Abstract. We introduce a view–point invariant representation of moving object trajectories that can be used in video database applications. It is assumed that trajectories lie on...
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Navigating through tree structures is a core operation in tree processing programs. Most notably, XML processing programs intensively use XPath, the path specification language t...
This paper presents a system for the exploration of projected interfaces. We describe our Visible Imagination (VI) platform combining a camera, projector and torch (flashlight) al...
The hourglass concept has been undisputable ruler of networking visions on the last years. As network evolution is now a hot topic, this article aims to reflect on this concept, h...