In this paper we present the design of an environment that offers personalized, ubiquitous information services in the emerging integrated world of the digital-TV and the Internet....
Fotis G. Kazasis, Nektarios Moumoutzis, Nikos Papp...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Given a large repository of geotagged imagery, we seek to automatically find visual elements, e.g. windows, balconies, and street signs, that are most distinctive for a certain g...
Carl Doersch, Saurabh Singh, Abhinav Gupta, Josef ...
Multitenant data infrastructures for large cloud platforms hosting hundreds of thousands of applications face the challenge of serving applications characterized by small data foo...
Aaron J. Elmore, Sudipto Das, Divyakant Agrawal, A...
This research’s primary contribution is providing a relatively straightforward, sustainable infrastructure for integrating documents and services. Users see a totally integrated...