Some of the data available to today’s enterprise applications is inconsistent. This is an inevitable consequence of data being distributed and partially replicated in many locati...
Peter Henderson, Robert John Walters, Stephen Crou...
In a previous experiment, we have studied the preference judgement of pictorial images with image experts and naive observers. We asked image experts to improve pictorial images t...
Clotilde Boust, Ferruccio Cittadini, Mohamed Ben C...
Intelligent tutoring systems (ITS) provide individualised instruction. They offer many advantages over the traditional classroom scenario: they are always available, non-judgement...
Scott P. Overmyer, Hamid Gholam Hosseini, Chao Fan...
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Simulation and Emulation techniques are fundamental to aid the process of large-scale protocol design and network operations. However, the results from these techniques are often ...
David W. Bauer, Garrett R. Yaun, Christopher D. Ca...