— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
In a packet switching based scenario, optical technologies can not completely overcome the problem of insufficient network capacity, due to limitations produced by the presence of ...
Visual attention is a mechanism which filters out redundant visual information and detects the most relevant parts of our visual field. Automatic determination of the most visually...
Olivier Le Meur, Patrick Le Callet, Dominique Barb...
In this paper a novel method for view independent human movement representation and recognition, exploiting the rich information contained in multi-view videos, is proposed. The bi...
Nikolaos Gkalelis, Nikos Nikolaidis, Ioannis Pitas
The correct and ecient management of data in distributed databases or mobile computing environments is dicult. Communication disruptions within such systems render the execution o...
Paul A. Jensen, Monica Brockmeyer, Nandit Soparkar