—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...
We address the problem of automated video tracking of targets when targets undergo multiple mutual occlusions. Our approach is based on the idea that as targets are occluded, sele...
— Throughput maximization in a packet switched wireless communication system is considered in this paper. The channel variation is accounted for by modeling the channel as a fin...
Abstract. We present a cooperation technique using an accurate management of nogoods to solve a hard real-time problem which consists in assigning periodic tasks to processors in t...
Any non-trivial top-level ontology should take temporal notions into account. The details of how this should be done, however, are frequently debated. In this paper it is argued th...