Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
In this paper, we present a proposal for Patients’ Mobile Monitoring. This framework enables the definition and generation of profiles, modules and communication structures betwe...
Vladimir Villarreal, Javier Laguna, Silvia L&oacut...
In this paper we present a generative, high resolution face representation which extends the well-known active appearance model (AAM)[5, 6, 7] with two additional layers. (i) One ...
A `second generation' approach to the provision of Grid middleware is now emerging which is built on service-oriented architecture and web services standards and technologies....
Paul Grace, Geoff Coulson, Gordon S. Blair, Lauren...
Abstract—CAN is a well-known DHT technique for contentbased P2P networks, where each node is assigned a zone in a virtual coordinate space to store the index of the data hashed i...