In many multimedia applications, there is a need to authenticate a source that has been subjected to benign degradations in addition to potential tampering attacks. We develop a m...
Knowledge management is very important in the consulting business. On the one hand knowledge is the crucial factor of production that differentiates consulting companies from thei...
In order to adequately process satellite and radar information, it is necessary to find the exact correspondence between different types of images and between these images and th...
Roberto Araiza, Hongjie Xie, Scott A. Starks, Vlad...
Abstract--The success of information and knowledge management depends on understanding and supporting the user's need to know. This requires understanding humans' abiliti...
A new notion of security boundary is introduced to model multilevel security policies in the scenario of mobile systems, within Cardelli and Gordon's "pure" mobile ...