Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Abstract. The literature on cross-layer protocols, protocol improvements, and design methodologies for wireless sensor networks (WSNs) is reviewed and a taxonomy is proposed. The c...
The human face plays a central role in most forms of natural human interaction so we may expect that computational methods for analysis of facial information and graphical and robo...
Flow visualization has been a very attractive component of scientific visualization research for a long time. Usually very large multivariate datasets require processing. These da...
Robert S. Laramee, Helwig Hauser, Helmut Doleisch,...
We extend a recently developed method [1] for learning the semantics of image databases using text and pictures. We incorporate statistical natural language processing in order to...