— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
—Depth camera such as Microsoft Kinect, is much cheaper than conventional 3D scanning devices, and thus it can be acquired for everyday users easily. However, the depth data capt...
Jing Tong, Jin Zhou, Ligang Liu, Zhigeng Pan, Hao ...
Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
The movement in public transport networks is organized according to schedules. The real-world schedules are specified by a set of periodic rules and a number of irregularities fr...
While it has been realized for quite some time within AI that abduction is a general model of explanation for a variety of tasks, there have been no empirical investigations into ...