Abstract. One of the most interesting challenges in Knowledge Discovery in Databases (KDD) eld is giving support to users in the composition of tools for forming a valid and useful...
Abstract— In this paper, we analyze and compare five imagebased visual servoing control laws. Three of them are classical while two new ones are proposed. The first new control...
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
The problem of computer treatment of notations for writing sign languages has seen some approaches in recent years, all of them, based on hard to use bitmap standard graphical for...
Planning is known to be a difficult task. One of the approaches used to reduce this difficulty is problem decomposition under divide-and-conquer methodology. This paper introduce...