In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
We seek to close the gap between software engineering (SE) and human-computer interaction (HCI) by indicating interdisciplinary interfaces throughout the different phases of SE an...
Thomas Memmel, Fredrik Gundelsweiler, Harald Reite...
This paper describes an evaluation of a consumer application for soccer highlights detection, which combines advanced user interaction with an underlying automatic highlights dete...
We present a method for picture detection in document page images, which can come from scanned or camera images, or rendered from electronic file formats. Our method uses OCR to s...
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...