—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
This paper presents a model based approach to human body tracking in which the 2D silhouette of a moving human and the corresponding 3D skeletal structure are encapsulated within ...
This paper addresses the implementation of advanced, online simulation experiments upon the World-Wide Web. The paper first discusses the system considered for this study. The pap...
The global inter-networking infrastructure that has become essential for contemporary day-to-day computing and communication tasks, has also enabled the deployment of several large...
Abstract. Constructive methods obtain solutions to constraint satisfaction problem instances by iteratively extending consistent partial assignments. In this research, we study the...
George Boukeas, Panagiotis Stamatopoulos, Constant...