For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
"The purpose of this paper is to introduce and study the most basic properties of three new variational problems which are suggested by applications to computer vision. In com...
Basic ideas are presented of a multi-national research project to share data about the Roman city of Aquileia employing the Information and Communication Technologies (ICT). A Cons...
— Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources...
Owen Conlan, John Keeney, Cormac Hampson, Fion&aac...
In this paper, a multiobjective (MO) learning approach to image feature extraction is described, where Pareto-optimal interest point (IP) detectors are synthesized using genetic p...