Research projects, assistive technology, and individuals all create metadata in order to improve Web accessibility for visually impaired users. However, since these projects are d...
Shinya Kawanaka, Yevgen Borodin, Jeffrey P. Bigham...
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Abstract-- In this paper we study different distributed estimation schemes for stochastic discrete time linear systems where the communication between the sensors and the estimatio...
Personalization has been deemed one of the major challenges in information retrieval with a significant potential for providing better search experience to individual users. Espec...
Julia Luxenburger, Shady Elbassuoni, Gerhard Weiku...