This paper retrospectively analyzes the progress of event-based capability and their applicability in various domains. Although research on event-based approaches started in a hum...
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
This paper proposes a definition, scope and topics of construction informatics--a discipline also known as `construction IT' or `communication and information technologies in...
The ability of recognizing object categories in 3D data is still an underdeveloped topic. This paper investigates on adopting Implicit Shape Models (ISMs) for 3D categorization, th...