Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Overhearing is an approach for monitoring open, distributed, multi-agent systems by listening to the routine communications taking place within them. Previous investigations of ov...
Multimedia information retrieval is a highly diverse field. A variety of data types, research problems, methodologies are involved. Researchers in the field come from very diff...
James Ze Wang, Nozha Boujemaa, Alberto Del Bimbo, ...
: In this paper we consider the vertex ranking problem of weighted trees. We show that this problem is strongly NP-hard. We also give a polynomial-time reduction from the problem o...
Extracting meaningful 3D human motion information from video sequences is of interest for applications like intelligent humancomputer interfaces, biometrics, video browsing and ind...