Tiny, low-cost sensor devices are expected to be failure-prone and hence in many realistic deployment scenarios for sensor networks these nodes are deployed in higher than necessa...
We present a Computer Vision based system that enables multiple people to interact naturally with a large display table using their own bare-hand gestures. The display presents an...
In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
Abstract. A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this n...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Thi...
Abstract. This paper describes how semantic bridges realized in terms of rulebased ontology mappings can be incorporated into BPEL processes. The approach is explained by applying ...