The Grid provides infrastructure that allows an arbitrary application to be executed on a range of different computational resources. When input files are very large, or when faul...
This paper evaluates the effectiveness of keypoint methods for content-based protection of digital images. These methods identify a set of “distinctive” regions (termed keypoi...
— Many tasks examined for robotic application like rescue missions or humanitarian demining require a robotic vehicle to navigate in unstructured natural terrain. This paper intr...
— Program code size is a critical factor in determining the manufacturing cost of many embedded systems, particularly those aimed at the extremely costconscious consumer market. ...
In this paper we show how we can translate Web Services described by WS-CDL into a timed automata orchestration, and more specifically we are interested in Web services with time ...