The research presented here addresses the problem of change impact analysis CIA for object-oriented software. A major problem for developers in an evolutionary environment is th...
Michelle Lee, A. Jefferson Offutt, Roger T. Alexan...
In video surveillance, automatic methods for scene understanding and activity modeling can exploit the high redundancy of object trajectories observed over a long period of time. ...
The choice of a color space is of great importance for many computer vision algorithms (e.g. edge detection and object recognition). It induces the equivalence classes to the actu...
The IEEE 802.11 standard currently does not offer support to exploit the unequal perceptual importance of multimedia bitstreams. All packets affected by channel errors, in fact, ...
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...