—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Recently, research in 3D computer graphics and interaction has started to move beyond the narrow domain of single object authoring and inspection, and has begun to consider comple...
James McCrae, Michael Glueck, Tovi Grossman, Azam ...
In the clinical environment the segmentation of organs is an increasingly important application and used, for example, to restrict the perfusion analysis to a certain organ. In ord...
Eva Eibenberger, Anja Borsdorf, Andreas Wimmer, Jo...
Abstract. In open and heterogeneous environments offered by the Internet, where agents are designed by different vendors, the development of standards for agent communication nee...