Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
E-Health systems include applications of information communication technologies to promote healthcare services support, delivery and education. The success of an E-Health system i...
JunHua Li, Lesley Pek Wee Land, Pradeep Ray, Subha...
In this work, we present an active-learning algorithm for piecewise planar 3D reconstruction of a scene. While previous interactive algorithms require the user to provide tedious i...
Adarsh Kowdle, Yao-Jen Chang, Andrew Gallagher, Ts...
When glancing at a magazine, or browsing the Internet, we are continuously being exposed to photographs. Despite of this overflow of visual information, humans are extremely good...
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...