Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Mobile Computing platforms such as mobile phones, PDAs or wearable computers operate in a much more volatile and limited environment than their stationary counterparts. Such platf...
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
This work describes a novel method for statistical analysis of multi-material components. The application scenario is industrial 3D X-ray computed tomography, emphasizing metrolog...
Actions in real world applications typically take place in cluttered environments with large variations in the orientation and scale of the actor. We present an approach to simult...