Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
— A considerable body of evidence indicates that the use of reliable link layer protocols over error prone wireless links dramatically improves the performance of Internet protoc...
— Robotics applications based on computer vision algorithms are highly constrained to indoor environments where conditions may be controlled. The development of robust visual alg...
Francesc Moreno-Noguer, Alberto Sanfeliu, Dimitris...
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
— Neural networks are used in a wide number of fields including signal and image processing, modeling and control and pattern recognition. Some of the most common type of neural ...
Raveesh Kiran, Sandhya R. Jetti, Ganesh K. Venayag...