Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Near-duplicate video clip (NDVC) detection is an important problem with a wide range of applications such as TV broadcast monitoring, video copyright enforcement, content-based vi...
Heng Tao Shen, Xiaofang Zhou, Zi Huang, Jie Shao, ...
Nowadays, more Virtual Environments (VEs) are becoming available on the Web. This means that VEs are becoming accessible to a larger and more diverse audience. It also means that i...
Frederic Kleinermann, Olga De Troyer, Christophe C...
We study the presence of obstacles in computing BCP(s, t) (Best Coverage Path between two points s and t) in a 2D field under surveillance by sensors. Consider a set of m line seg...
An approach for reducing the navigation effort for the users of a web site is to enhance its hyperlink structure with additional hotlinks. We address the task of adding at most on...