In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...
The counterexamples produced by model checkers are often lengthy and difficult to understand. In practical verification, showing the existence of a (potential) bug is not enough: ...
Data Driven Time Synchronization (DDTS) provides synchronization across sensors by using underlying characteristics of data collected by an embedded sensing system. We apply the c...
Martin Lukac, Paul Davis, Robert Clayton, Deborah ...
This paper presents a fast and efficient method to determine intervertebral disk orientation in a magnetic resonance (MR) image of the spine. The algorithm originates from active ...
Amer Abufadel, Gregory G. Slabaugh, Gozde B. Unal,...