Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
The task addressed in this paper, finding experts in an enterprise setting, has gained in importance and interest over the past few years. Commonly, this task is approached as an ...
Multimedia database systems (MMDBSs) have to be capable to handle efficiently time-dependent and timeindependent data, and to support Quality-of-Service (QoS). To support continuo...
GikiCLEF focused on the evaluation of the reasoning capabilities of systems to provide right answers for geographically-challenging topics. As we did not have previous experience ...
Nuno Cardoso, David Batista, Francisco J. Ló...
This paper presents a markerless tracking technique targeted to the Windows Mobile Pocket PC platform. The primary aim of this work is to allow the development of standalone augme...