In this work, we propose a new method for extracting user preferences from a few documents that might interest users. For this end, we first extract candidate terms and choose a n...
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Localization technologies have been an important focus in ubiquitous computing. This paper explores an underrepresented area, namely computer vision technology, for outdoor positio...
Ulrich Steinhoff, Dusan Omercevic, Roland Perko, B...
Abstract—Positive stable laws have become a standard tool in modelling heavy tailed data in such diverse areas as finance, engineering and survival analysis. Due to the non–ex...
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...