Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Abstract. Robust foreground object segmentation via background modelling is a difficult problem in cluttered environments, where obtaining a clear view of the background to model i...
Vikas Reddy, Conrad Sanderson, Andres Sanin, Brian...
Nonnegative Matrix Factorization (NMF) is a powerful decomposition tool which has been used in several content representation applications recently. However, there are some diffic...
Autonomic Management capabilities become increasingly important for attaining functional and quality goals in software systems. Nonetheless, successful Autonomic Management soluti...
Despite many works in CSCW, groupware, workflow systems and social networks, computer support for human-to-human interactions is still insufficient, especially support for agility,...