Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Management applications are sensitive to changes in application and system configuration. This coupling makes it difficult and expensive to develop management applications and kee...
Asham El Rayess, Vidar Vetland, Jerome A. Rolia, J...
Abstract. Creating computer-interpretable guidelines (CIGs) requires much effort. This effort would be leveraged by sharing CIGs with more than one implementing institution. Sharin...
In this paper, we consider the problem of tracking nonrigid surfaces and propose a generic data-driven mesh deformation framework. In contrast to methods using strong prior models...
A component-based generic agent architecture for multi-attribute (integrative) negotiation is introduced and its application is described in a prototype system for negotiation abo...