In this paper, we present a PDA-based face recognition system as well as some of the associated challenges of developing a PDAbased face recognition system. We describe a prototyp...
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
We analyze a problem, which is relevant for physiological modeling of vascular networks: the initialization and optimization of specific, individual models of a functioning vessel ...
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analys...
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...