: In this paper we explore the possibilities to perform the search for results of non-deterministic computations in parallel. We present three different approaches to this problem:...
Abstract: Our paper deals with the security of operational environments for evoting and its importance for the security of electronic elections. So far the security of e-voting was...
Axel Schmidt, Melanie Volkamer, Lucie Langer, Joha...
: The Sensor Integration Package is a reusable subsystem, combining the complementary capabilities of radar, infra red and long range day light camera, laser, image processing soft...
: A majority of biodiversity research projects depend on field recording and ecology data. Therefore it is important to provide a seamless and transparent data flow from the field ...
Stefan Jablonski, Alexandra Kehl, Dieter Neubacher...
: Obesity has reached epidemic proportions globally. WHO projects that by the year 2015, approximately 2.3 billion adults will be overweight and more than 700 million will be obese...
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...