For users of CAD data, few things are as frustrating as receiving unusable, poor quality data. Users often waste time fixing or rebuilding such data from scratch on the basis of p...
In cognitive radio networks, secondary user (SU) does not have rights to transmit when the primary user (PU) band is occupied, that's why a sensing technique must be done. Rec...
Bassem Zayen, Aawatif Hayar, Hamza Debbabi, Hichem...
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
This paper describes a new virtual reality system designed to be small enough to be totally portable. It is a semiimmersive interaction system based on a movable stereoscopic proj...