In a supply chain organized as a network of autonomous enterprises, the main objective of each partner is to optimize his production and supply policy with respect to his own econ...
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
Active reading of audiovisual documents is an iterative activity, dedicated to the analysis of the audiovisual source through its enrichment with structured metadata and the defin...
This study addresses the dynamical nature of a "representation-hungry" cognitive task involving an imagined action. In our experiment, participants were handed rods that...
Iris van Rooij, Raoul M. Bongers, Willem F. G. Has...
In this paper we present a scene analysis technique with subpixel filtering based on dense coded light fields. Our technique computes alignment and optically projects analysis ...