IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
Effective use of the vast quantity of information now available on the web will require the use of “Semantic Web” markup languages such as the DARPA Agent Markup Language (DAML...
R. Scott Cost, Timothy W. Finin, Anupam Joshi, Yun...
In this paper we propose a new operator for advanced exploration of large multidimensional databases. The proposed operator can automatically generalize from a specific problem c...
: In modern organisations the monolithic information systems of the past are being gradually replaced by networked systems, enabling distributed computing often based on multi-agen...
2. Obtain the gray-levelgradient magnitude. 3. Derive the threshold surface by deforming the original image gray-level surface. 4. The thresholdsurface interpolation. 5. Segmentati...
C. C. Leung, Francis H. Y. Chan, Paul C. K. Kwok, ...