Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Manifold clustering, which regards clusters as groups of points around compact manifolds, has been realized as a promising generalization of traditional clustering. A number of lin...
Database systems often use XML schema to describe the format of valid XML documents. Usually, this format is determined when the system is designed. Sometimes, in an already funct...
Jarek Gryz, Marcin Kwietniewski, Stephanie Hazlewo...
This paper aims at the delivery of adaptive and personalized multimedia content in interactive IPTV environments, using programmable IP services through the MPEG-21 standard, suppo...
Ioannis Anagnostopoulos, Christos-Nikolaos Anagnos...
VirtualizeMe introduces a new design for a fully immersive TeleImmersion system for remote collaboration and virtual world interaction. This system introduces a new avatar creatio...