The problem of efficiently finding images that are similar to a target image has attracted much attention in the image processing community and is rightly considered an informatio...
Xiaopeng Xi, Eamonn J. Keogh, Li Wei, Agenor Mafra...
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
The methods and technologies providing advantages in controlling and managing intellectual property rights are currently associated under the term Digital Rights Management (DRM)....
Development of computer communications has catalyzed integration processes in world communities. Initial efforts concerning integration have showed great heterogeneity between dat...
Olena Kaykova, Oleksiy Khriyenko, Mikko Kovalainen...
The importance of effective customer assistance technologies is imperative in today's online marketplace where users are oftentimes overwhelmed by the product choices availab...
John Doody, Edwin Costello, Lorraine McGinty, Barr...