Abstract. In this paper we attempt to characterize resources of information complementary to audio-visual (A/V) streams and propose their usage for enriching A/V data with semantic...
Jan Nemrava, Paul Buitelaar, Thierry Declerck, Voj...
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
We show that the idea of predicates on heap objects can be cast in the framework of predicate abstraction. This leads to an alternative view on the underlying concepts of three-val...
Methodologies for multiagent system development should assist the developer in making decisions about those aspects of the analysis, design and implementation, that are crucial fo...
Mehdi Dastani, Joris Hulstijn, Frank Dignum, John-...
A novel technique is presented in this paper to extract strings in color images of both Business Settlement Plan (BSP) and non-BSP airline coupon. The essential concept is to remo...