The Extensible Markup Language is susceptible to security breaches because it does not incorporate methods to protect the information it encodes. Our work presented in this paper f...
CBR systems are normally used to assist experts in the resolution of problems. During the last few years, researchers have been working in the development of techniques to automate...
Most operators for merging multiple knowledge bases (where each is a set of formulae) aim to produce a knowledge base as output that best reflects the information available in the ...
In this paper, we present a new segment-based stereo matching algorithm using graph cuts. In our approach, the reference image is divided into non-overlapping homogeneous segments...
In this paper we introduce a new method of motion blur identification that relies on the availability of two, differently exposed, image shots of the same scene. The proposed appr...