Eliciting the requirements for a proposed system typically involves different stakeholders with different expertise, responsibilities, and perspectives. Viewpoints-based approache...
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
In this paper we introduce a robust matching technique that allows to operate a very accurate selection of corresponding feature points from multiple views. Robustness is achieved...
Emanuele Rodolà, Andrea Albarelli, Andrea Torsell...
Higher education licensing, i.e. the process of granting permissions to provide certain educational services, is an important process of public administration. Governmental bodies ...
Olga Cherednichenko, Dmytro Kuklenko, Sergiy Zlatk...
This paper describes an approach (and its implementation) on how to handle the large number of data from user centered engineering processes. It uses objectoriented abstraction me...