Biological research in the field is constrained by the speed and difficulty of species determination, as well as by access to relevant information about the species encountered. H...
— Assuring cryptographic integrity of mutable fields in any on-demand ad hoc routing protocol is more challenging than that of non mutable fields. We propose an efficient auth...
We present an algorithm for compressing 2D vector fields that preserves topology. Our approach is to simplify the given data set using constrained clustering. We employ different...
Suresh K. Lodha, Jose C. Renteria, Krishna M. Rosk...
Shape comparisons of two groups of objects often have two goals: to create a classifier to separate the groups and to provide information that shows differences between classes. We...
Samson J. Timoner, Polina Golland, Ron Kikinis, Ma...
With the rapid progress of mobile devices and positioning technologies, Trajectory Databases (TD) have been in the core of database research during the last decade. Analysis and k...
Nikos Pelekis, Ioannis Kopanakis, Irene Ntoutsi, G...