In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
For over 3 decades, computer graphics technology has been developed to simulate physically accurate image of real scene. Meanwhile, useful tone mapping methods have been developed...
This paper describes the robot vision track that has been proposed to the ImageCLEF 2010 participants. The track addressed the problem of visual place classification, with a specia...
Andrzej Pronobis, Marco Fornoni, Henrik I. Christe...
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...
We reflect on activities to design a mobile application to enable rural people in South Africa's Eastern Cape to record and share their stories, which have implications for `...
Nicola J. Bidwell, Thomas Reitmaier, Gary Marsden,...