The prevailing architecture for web-based applications relies on HTML, HTTP and loosely integrated functional elements, propagating a strong distinction between client and server....
This paper presents a mapping solution from ERDF(S) to Take vocabulary. The work is related to an investigation of integrating ERDF Derivation Rules into Take inference engine. Som...
Ion-Mircea Diaconescu, Adrian Giurca, Gerd Wagner,...
Robotic technology can be used in several ways to benefit people with disabilities. This paper describes the mounting of a robotic arm to a powered wheelchair to assist disabled u...
Michael Hillman, Karen Hagan, Sean Hagan, Jill Jep...
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Fusion of multiple face and fingerprint matchers based on different biometrics for personal authentication has been investigated in the last years. However, the performance achiev...