To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
We propose a new approach of video imaging method suitable to support distance learning. Automatic active camera control and video selection system visualizes presentation informa...
Research on recommender systems has primarily addressed centralized scenarios and largely ignored open, decentralized systems where remote information distribution prevails. Absenc...
In this paper we present a telerehabilitation system aiming to help physiotherapists on the shoulder and elbow treatment. Our system is based on a two-arm haptic force feedback to ...
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...