- In recent years, many quantum cryptographic schemes have been proposed. However, it seems that there are many technical difficulties to realize them (except Quantum Key Distribut...
Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Shel...
This paper describes the architecture of a visual surveillance system that combines real time computer vision algorithms with logic programming to represent and recognize activiti...
Model driven development (MDD) tackles software complexity through the use of models. However, managing relationships and specifying transformations models at various levels of ab...
Arnor Solberg, Devon M. Simmonds, Raghu Reddy, Sud...
Face recognition in video has gained wide attention as a covert method for surveillance to enhance security in a variety of application domains (e.g., airports). A video contains ...
Although the Internet provides nonprofit organizations with unprecedented opportunities for fundraising, the volume of online donations has been miniscule. Since one reason for th...