The present paper reports on an end-to-end application using a deep processing grammar to extract spatial and temporal information of prepositional and adverbial expressions from ...
Lars Hellan, Dorothee Beermann, Jon Atle Gulla, At...
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
An error-comprising workflow dejinition might provoke serious problems to an enterprise especially when it is involved with mission critical business processes. Concurrency of wor...
It is a fact that many XML query languages lack support for update operations. Those that have minimal support do not concern with preserving documents' constraints, and cons...
Abstract. Recent efforts in robust estimation of the two-view relation have focused on uncalibrated cameras with no prior knowledge of pose. However, in practice robotic vehicles t...