Currently, video analysis algorithms suffer from lack of information
regarding the objects present, their interactions,
as well as from missing comprehensive annotated video
dat...
Jenny Yuen, Bryan Russell, Ce Liu, Antonio Torralb...
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
This paper proposes a study of the IPTV world, focusing on network and system architectures, video codecs, network protocols, services and quality assurance. Based on this study, a...
—Feature-based intelligent design and manufacturing systems in the Internet environment are an evolution of traditional geometric and solid modeling systems. This paper presents ...
Jin Hou, Dengsheng Zhang, Zeng Chen, Xuerong Xu, T...
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...