In this paper, we propose a technique for detecting possible events in outdoor areas monitored by a video surveillance system. In particular, here we focus on the time spent by an...
Christian Micheloni, Lauro Snidaro, Claudio Piciar...
Dynamic slicing algorithms can greatly reduce the debugging effort by focusing the attention of the user on a relevant subset of program statements. In this paper we present the d...
—The productivity of scientists and the quality of their papers differ enormously. Still, all papers written get published eventually and the impact factor of the publication cha...
Recently, privacy preserving data publishing has received a lot of attention in both research and applications. Most of the previous studies, however, focus on static data sets. I...
Bin Zhou 0002, Yi Han, Jian Pei, Bin Jiang, Yufei ...
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...