Abstract. This paper introduces the application of the feature transformation approach proposed by Torkkola [1] to the domain of image processing. Thereto, we extended the approach...
Erik Schaffernicht, Volker Stephan, Horst-Michael ...
Abstract. In this paper our original methodology of applying ontologybased logic into decision support system for security management in heterogeneous networks is presented. Such d...
Michal Choras, Rafal Kozik, Adam Flizikowski, Rafa...
This paper presents SYLPH, a novel distributed architecture which integrates a service-oriented approach into Wireless Sensor Networks. One of the characteristics of SYLPH is that ...
Dante I. Tapia, Ricardo S. Alonso, Juan Francisco ...
Many parameterized algorithms for NP-hard graph problems are search tree algorithms with sophisticated local branching rules. But it has also been noticed that the global structur...
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...