Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Evaluation of ontology alignments is in practice done in two ways: (1) assessing individual correspondences and (2) comparing the alignment to a reference alignment. However, this ...
Laura Hollink, Mark van Assem, Shenghui Wang, Anto...
Abstract— Bluetooth is an enabling technology used to construct personal area networks. Since Bluetooth devices are usually energy-constrained, a critical issue for Bluetooth net...
Active Appearance Models (AAMs) are generative parametric models that have been successfully used in the past to track faces in video. A variety of video applications are possible...
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...