Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Model-based development is becoming an increasingly common development methodology. In important domains like embedded systems already major parts of the code are generated from m...
High quality obstetric images have become readily available with fast magnetic resonance imaging protocols or new 3D ultrasound probes. These obstetric images provide detailed info...
Juan Pablo de la Plata Alcalde, Lazar Bibin, J&eac...
This paper describes efforts by the University of Pennsylvania's Linguistic Data Consortium to create and distribute shared linguistic resources – including data, annotation...
Abstract— This paper describes an automatic wireless LAN access points planning approach based on a multicriteria modelling and solving. A realistic and efficient wLAN planning ...