Various new imaging techniques have been used at the C2RMF, in order to digitize paintings and objects. These techniques are used for extensive and detailed non-destructive analys...
An experimental study of the feasibility and accuracy of the acyclicity approach introduced in [14] for the inference of business relationships among autonomous systems (ASes) is ...
In this work we aim to capitalize on the availability of Internet image search engines to automatically create image training sets from user provided queries. This problem is part...
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
We calculate an extensive set of characteristics for Internet AS topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP,...
Priya Mahadevan, Dmitri V. Krioukov, Marina Fomenk...