Telecommunications, Computing, and Video Technologies are rapidly converging, creating a new multimedia industry that will serve emerging markets on the information highways. To s...
: Mixin-based inheritance is an inheritance technique that has been shown to subsume a variety of different inheritance mechanisms. It is based directly upon an incremental modific...
Patrick Steyaert, Wim Codenie, Theo D'Hondt, Koen ...
Rewriting is a computational paradigm that specifies the actions, but not the control. We introduce a hierarchical structure repreat a high level of abstraction, a form of control....
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
In this paper, we use stereo vision processing techniques to detect and localise sensors used for monitoring simulated environmental events within an experimental sensor network t...
Dermot Diamond, Noel E. O'Connor, Alan F. Smeaton,...