The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
We report on event recognition within the life logging application IYOUIT for the automatic creation of static diary-like Blogs. Based on the qualitative context histories produced...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
In this paper, we present ACTIVe3D-Build, an electronic platform for the management of civil engineering projects. This platform is the result of a research that aims to represent...
We consider the problem of developing an automated visual solution for detecting human activities within industrial environments. This has been performed using an overhead view. Th...
Banafshe Arbab-Zavar, Imed Bouchrika, John N. Cart...