Database software can be tailored for specific application domains and their required functionality, for specific hardware and its characteristics, or for other purposes. This bri...
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
A major source of information (often the most crucial and informative part) in scholarly articles from scientific journals, proceedings and books are the figures that directly pro...
Amr Ahmed, Eric P. Xing, William W. Cohen, Robert ...
We demonstrate a fully working system for multifaceted browsing over large collections of text-annotated data, such as annotated images, that are stored in relational databases. T...
Wisam Dakka, Panagiotis G. Ipeirotis, Kenneth R. W...
—Techniques for automatic annotation of spoken content making use of speech recognition technology have long been characterized as holding unrealized promise to provide access to...
Roeland Ordelman, Franciska de Jong, Martha Larson