Supporting users’ navigation is a fundamental feature of mobile guides. This paper presents an experimental evaluation comparing three different ways of providing navigation gu...
The sequence mining problem consists in finding frequent sequential patterns in a database of time-stamped events. Several application domains require limiting the maximum tempor...
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
Different environment illumination has a great impact on face detection. In this paper, we present a solution by the face relighting based on the harmonic images. The basic idea i...
Jie Chen, Yuemin Li, Laiyun Qing, Baocai Yin, Wen ...
Reconfigurable hardware resources are very expensive, and yet can be underutilized. This paper describes a middleware capable of discovering underutilized computing nodes with FPG...
Kris Gaj, Tarek A. El-Ghazawi, Nikitas A. Alexandr...