Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
This paper reports an experience in which a temporal database was used to analyze the results of a survey on human behaviors and displacements in a ski resort. This survey was par...
Marie-Christine Fauvet, S. Chardonnel, Marlon Duma...
In this article, an approach to semantic image analysis is presented. Under the proposed approach, ontologiesareusedtocapturegeneral,spatial,andcontextualknowledgeofadomain,andage...
We present an efficient and accurate object tracking algorithm based on the concept of graph cut segmentation. The ability to track visible objects in real-time provides an inval...
We present an application of inductive concept learning and interactive visualization techniques to a large-scale commercial data mining project. This paper focuses on design and c...
William H. Hsu, Michael Welge, Thomas Redman, Davi...