Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
Automatic segmentation and analysis of ancient mosaic images can help archaeologists and experts build digital collections and automatically compare mosaics by means of image datab...
: Mass digitization of document collections with further processing and semantic annotation is an increasing activity among libraries and archives at large for preservation, browsi...
: This paper analyses the requirements of automation and adaptation in the so called perceptive environments. These environments are places with the ability of perceiving the conte...
: Most information in Hospitals is still only available in text format and the amount of this data is immensely increasing. Consequently, text mining is an essential area of medica...
Andreas Holzinger, Regina Geierhofer, Felix Mö...