We introduce an image retrieval method for searchingan image database by using a query image that has similarity in its global and/or regional image contents to the intended targe...
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Networked virtual environments like Second Life enable distant people to meet for leisure as well as work. But users are represented through avatars controlled by keyboards and mo...
Benjamin Petit, Thomas Dupeux, Benoit Bossavit, Jo...
Background: A wide range of research areas in bioinformatics, molecular biology and medicinal chemistry require precise chemical structure information about molecules and reaction...