Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
The work presents the first effort to automatically annotate the semantic meanings of temporal video patterns obtained through unsupervised discovery processes. This problem is in...
Lexing Xie, Lyndon S. Kennedy, Shih-Fu Chang, Ajay...
This paper presents a simulation analysis for the evaluation of the admission region of a IEEE 802.11e network adopting the EDCA (Enhanced Distributed Channel Access) mechanism. In...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
This paper presents novel methods for classifying images based on knowledge discovered from annotated images using WordNet. The novelty of this work is the automatic class discove...
This paper addresses the problem of mapping an application, which is highly dynamic in the future, onto a heterogeneous multiprocessor platform in an energy efficient way. A two-p...
Rudy Lauwereins, Chun Wong, Paul Marchal, Johan Vo...