The operation and transit of emergency vehicles on an automated highway system (AHS) designed under the control architecture proposed in the California Partners for Advanced Transi...
Charmaine Toy, Kevin Leung, Luis Alvarez, Roberto ...
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
The GESTALT-System is a stratified architecture for challenging computer vision tasks. This contribution focuses on the 3rd and 4th layer of it – the grouping and decision layer...
Eckart Michaelsen, Uwe Stilla, Uwe Soergel, Leo J....