— We propose new algorithms to achieve k-coverage in dense sensor networks. In such networks, covering sensor locations approximates covering the whole area. However, it has been...
In this paper we present an approach for lip motion analysis that can be used in conjunction with a person authentication system based on face recognition, to avoid attacks on the...
Faisal Shafait, Ralph Kricke, Islam Shdaifat, Rolf...
We present a web-based environment for the Automated Dental Identification System (ADIS). This system is designed for identification missing, unidentified and wanted persons based...
Gamal Fahmy, Diaa Eldin M. Nassar, Eyad Jai-Said, ...
Nowadays the photo-capturing devices are no longer limited to digital cameras but include mobile phones, PDAs and others. This is leading to a new problem: a very large number of ...
Yuri Almeida Lacerda, Hugo Feitosa de Figueir&ecir...
We present a system for efficient meta-data indexed querying of XML documents. Given the diversity of the information available in XML, it is very useful to annotate XML data wit...