Event processing will play an increasingly important role in constructing enterprise applications that can immediately react to business critical events. Various technologies have...
Roger S. Barga, Jonathan Goldstein, Mohamed H. Ali...
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
In a B2B environment business partners interact with each other by exchanging electronic business documents. The agreements and commitments between the partner require a certain o...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
We propose a methodology for hypermedia design which is based on a UML profile for the hypermedia domain. Starting with a use case analysis and a conceptual model of the applicatio...
We present an estimation-theoretic approach to curve evolution for the Mumford-Shah problem. By viewing an active contour as the set of discontinuities in the Mumford-Shah problem...