This paper shows an approach for converting bitmap images of text glyphs into a vector format which is suitable for being embedded in XML representations of digitized documents. T...
Stefan Pletschacher, Marcel Eckert, Arved C. H&uum...
Abstract. Research in context-aware systems shows that using context information enables the development of personalized mobile applications. The context acquisition process in a c...
Tom Broens, Aart van Halteren, Marten van Sinderen
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Due to the lack of built-in quality of service support, IEEE 802.11 ad-hoc networks presents serious defies in meeting the demands of multimedia applications. To overcome such ch...
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...