—The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be...
This paper presents a new enhanced text extraction algorithm from degraded document images on the basis of the probabilistic models. The observed document image is considered as a...
The current industry-driven trend of providing flexible eservices lays the ground for the new research area “service value networks” (SVNs). We observe a rising number of ind...
Benjamin Blau, Jan Kramer, Tobias Conte, Clemens v...
— The service-oriented architecture has come a long way in solving the problem of reusability of existing software resources. Grid applications today are composed of a large numb...
The Shadow Box is a tangible computing project that exploits visual association and auditory clues to teach children the representational relationship between words and their mean...
Ja-Young Sung, Aaron Levisohn, Ji-won Song, Ben To...