Securing multimedia transmission has become a challenging issue due to the popularization of real-time multimedia applications such as video surveillance, satellite communication ...
Abstract. Our goal is to extract consistent bits from the same ļ¬ngerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
The need for providing learners with web-based learning content that match their accessibility needs and preferences, as well as providing ways to match learning content to userā...
Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
The Mondex Electronic Purse system [18] is an outstanding example of formal reļ¬nement techniques applied to a genuine industrial scale application, and notably, was the ļ¬rst ve...
Richard Banach, Michael Poppleton, Czeslaw Jeske, ...