Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
Crosscutting concerns are pervasive in embedded software, because of the various constraints imposed by the environment and the stringent QOS requirements on the system. This pape...
Thomas Cottenier, Aswin van den Berg, Tzilla Elrad
Our research aims at discovering useful knowledge from the large collection of satellite images of typhoons using data mining approaches. We first introduce the creation of the typ...
In this paper, we describe a new method for camera-based fiducial tracking. Our new method is based on the combination of topological region adjacency and angle information, where...
While commercial solutions for precise indoor positioning exist, they are costly and require installation of additional infrastructure, which limits opportunities for widespread ad...