The European Concerted Action \COMPARES" (Concerted Action on COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data) was funded within the Environment an...
Jim Austin, Giorgio Giacinto, I. Kanellopoulos, Ke...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Tool environments supporting the development of complex products need to be open and flexible. These requirements cannot be fulfilled in an adequate way by predefined coordinat...
: We address computer support for work and its coordination in one of the radio channels of the Danish Broadcasting Corporation. Based upon ethnographically inspired analysis and p...
Multiple images of a scene are related through 20/3D view transformations and linear and non-linear camera transformations. In all the traditional techniques to compute these tran...