enter search term and/or author name
Data-Driven Techniques in Disaster Information Management
Tao Li, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang, Hsin-Yu Ha, Wei Xue, Yue Huang, Shu-Ching Chen, Jainendra Navlakha, S. S. Iyengar
Article No.: 1
Improving disaster management and recovery techniques is one of national priorities given the huge toll caused by man-made and nature calamities. Data-driven disaster management aims at applying advanced data collection and analysis technologies...
It is common for organizations to maintain multiple variants of a given business process, such as multiple sales processes for different products or multiple bookkeeping processes for different countries. Conventional business process modeling...
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence
Marwa Salayma, Ahmed Al-Dubai, Imed Romdhani, Youssef Nasser
Article No.: 3
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, the entertainment and ambient intelligence...
Evaluation of Knowledge Gaps in Mathematical Applications of Thermal Image Processing Techniques for Fire Prevention
Sayantan Nath, Sonali Agarwal, G. N. Pandey
Article No.: 4
In this article, we present literature reviews on fire prevention methods, especially in mining industries, using thermal image processing techniques. Fire protection systems are crucial because of the increased loss of human lives due to coal...
Data-flow testing (DFT) is a family of testing strategies designed to verify the interactions between each program variable’s definition and its uses. Such a test objective of interest is referred to as a def-use pair. DFT selects...
A timing channel is a communication channel that can transfer information to a receiver/decoder by modulating the timing behavior of an entity. Examples of this entity include the interpacket delays of a packet stream, the reordering packets in a...
A Survey of Qualitative Spatial and Temporal Calculi: Algebraic and Computational Properties
Frank Dylla, Jae Hee Lee, Till Mossakowski, Thomas Schneider, André Van Delden, Jasper Van De Ven, Diedrich Wolter
Article No.: 7
Qualitative spatial and temporal reasoning (QSTR) is concerned with symbolic knowledge representation, typically over infinite domains. The motivations for employing QSTR techniques include exploiting computational properties that allow efficient...
Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey
Raghavendra Ramachandra, Christoph Busch
Article No.: 8
The vulnerability of face recognition systems to presentation attacks (also known as direct attacks or spoof attacks) has received a great deal of interest from the biometric community. The rapid evolution of face recognition systems into...
Hypervideos and Interactive Multimedia Presentations
Article No.: 9
Hypervideos and interactive multimedia presentations allow the creation of fully interactive and enriched video. It is possible to organize video scenes in a nonlinear way. Additional information can be added to the video ranging from short...
Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review
Admela Jukan, Xavi Masip-Bruin, Nina Amla
Article No.: 10
Animals play a profoundly important and intricate role in our lives today. Dogs have been human companions for thousands of years, but now they work to assist the disabled, and in combat and search and rescue situations. Farm animals are a...
Hashing Techniques: A Survey and Taxonomy
Lianhua Chi, Xingquan Zhu
Article No.: 11
With the rapid development of information storage and networking technologies, quintillion bytes of data are generated every day from social networks, business transactions, sensors, and many other domains. The increasing data volumes impose...
Understanding Human-Machine Networks: A Cross-Disciplinary Survey
Milena Tsvetkova, Taha Yasseri, Eric T. Meyer, J. Brian Pickering, Vegard Engen, Paul Walland, Marika Lüders, Asbjørn Følstad, George Bravos
Article No.: 12
In the current hyperconnected era, modern Information and Communication Technology (ICT) systems form sophisticated networks where not only do people interact with other people, but also machines take an increasingly visible and participatory...
Surviving the Web: A Journey into Web Session Security
Stefano Calzavara, Riccardo Focardi, Marco Squarcina, Mauro Tempesta
Article No.: 13
In this article, we survey the most common attacks against web sessions, that is, attacks that target honest web browser users establishing an authenticated session with a trusted web application. We then review existing security solutions that...
Software product lines (SPL) aim at reducing time-to-market and increasing software quality through extensive, planned reuse of artifacts. An essential activity in SPL is variability management, i.e., defining and managing commonality and...
A Survey on Financial Applications of Metaheuristics
Amparo Soler-Dominguez, Angel A. Juan, Renatas Kizys
Article No.: 15
Modern heuristics or metaheuristics are optimization algorithms that have been increasingly used during the last decades to support complex decision-making in a number of fields, such as logistics and transportation, telecommunication networks,...
Control-Flow Integrity: Precision, Security, and Performance
Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer
Article No.: 16
Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today’s systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the...