Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
During the last decade, teams working on information technology (IT) development and implementation projects have experienced significant transformations. Nowadays, many members o...
The characterization of the transfer function of the power line (PL) channel is a nontrivial task that requires a truly interdisciplinary approach. Until recently, a common attribu...
This paper describes in details the first version of Morphonette, a new French morphological resource and a new radically lexeme-based method of morphological analysis. This resea...
This work addresses the important problem of the discovery
and analysis of social networks from surveillance video.
A computer vision approach to this problem is made possible
b...
Ting Yu, Ser Nam Lim, Kedar A. Patwardhan, Nils Kr...