Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
A system for recognition and morphological classification of unknown German nouns is described. It takes raw texts in German as input and outputs a list of the unknown nouns togeth...
Preslav Nakov, Yury Bonev, Galia Angelova, Evelyn ...
Abstract. We present a knowledge-based system, for skills and talent management, exploiting semantic technologies combined with top-k retrieval techniques. The system provides adva...
Line localization from a single image of a central camera is an ill-posed problem unless other constraints or apriori knowledge are exploited. Recently, it has been proved that no...
: We present a scene acquisition system which allows for fast and simple acquisition of arbitrarily large 3D environments. We propose a small device which acquires and processes fr...
Benjamin Huhle, Philipp Jenke, Wolfgang Straß...