The parallelization of two applications in symmetric cryptography is considered: block ciphering and a new method based on random sampling for the selection of basic substitution ...
Vincent Danjean, Roland Gillard, Serge Guelton, Je...
Abstract. We present a markerless real-time, model-based 3D face tracking methodology. The system combines two robust and complimentary optimization-based strategies, namely active...
Existing Web image search engines index images by textual descriptions including filename, image caption, surrounding text, etc. However, the textual description available on the W...
The Hierarchical Task Network (HTN) planning method is conceived of as a useful method for Web service composition as well as classical task planning. However, there are no complet...
Publish/subscribe (or pub/sub) systems perform asynchronous message transmission, from publishers to subscribers, without any of the parties having knowledge of the other. The pub...