: One of today’s hottest IT topics is integration, as bringing together information from different sources and structures is not completely solved. The approach outlined here wan...
Andreas Maier, Jessica Aguado, Amaia Bernaras, I&n...
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Xenbase (www.xenbase.org), the model organism database for Xenopus laevis and X. (Silurana) tropicalis, is the principal centralized resource of genomic, development data and comm...
Jeff B. Bowes, Kevin A. Snyder, Erik Segerdell, Ch...
Multi-channel information systems involve data redundancy, which, in turn, requires the implementation of synchronization mechanisms among overlapping databases. This need for peri...
Cinzia Cappiello, Chiara Francalanci, Barbara Pern...