Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Abstract. Distributedobject middleware, suchas CORBA, hides systemand network-speci c characteristics of objects behind functional interface speci cations. This simpli es developme...
Joseph P. Loyall, David E. Bakken, Richard E. Scha...
We present the Genetic L-System Programming (GLP) paradigm for evolutionary creation and development of parallel rewrite systems (Lsystems, Lindenmayer-systems) which provide a com...
Augmented Reality (AR) in multimedia gaming is a dynamic and exciting field of research. One of the challenges is to have multiple users interacting in the networked augmented rea...
Daniel Chun-Ming Leung, Pak-Shing Au, Irwin King, ...
The Principal Components Analysis (PCA) is one of the most successfull techniques that have been used to recognize faces in images. This technique consists of extracting the eigenv...