From time to time we hear of disasters of people accidentally leaking their sensitive pictures. It\u27s surprising that users take so many digital pictures today but smartphone makers still store pictures in such an easy‐to‐access way. A design is proposed to automatically encrypt sensitive pictures and apply a strict authorization when accessing them
With the magnitude of telemetry data constantly increasing, effective data analytics requires effici...
The method described below will predict printer models showing anomalous behavior by going through t...
THE world is about to witness a "techtonic" shift induced by the iPad. It is expected to result in a...
The pandemic has forced a large segment of the global workforce to go through a remote‐work experime...
A method for secure multiparty anonymized analytics using a federated schema is disclosed. The metho...
A digital document scanner capable of scanning multiple documents from flatbed without multiple pres...
This document is organized as a “step‐by‐step”guide to reproduce the invention in a correct way
This paper explores the ethical frames and implications of the 2014 leak of a large archive of digit...
A connecting device in a public environment looks for a trusted target device that maintains high se...
Safety sensors are used to continuously monitor the Intermediate Transfer Member (ITM) drum for poss...
Today, methods of purifying air have become small and USB‐C powered to allow for personal air purifi...
Printers usually have large beams inside that require very precise positions. The room around the pr...
Photographs are often thought to be a record of reality. Rather than being a representation, they se...
J. M. de Fuentes, L. Gonzalez-Manzano and P. Peris-Lopez have been partially supported by MINECO gra...
When scanning a document, the goal in most cases is to obtain another printed copy. However, there a...
With the magnitude of telemetry data constantly increasing, effective data analytics requires effici...
The method described below will predict printer models showing anomalous behavior by going through t...
THE world is about to witness a "techtonic" shift induced by the iPad. It is expected to result in a...
The pandemic has forced a large segment of the global workforce to go through a remote‐work experime...
A method for secure multiparty anonymized analytics using a federated schema is disclosed. The metho...
A digital document scanner capable of scanning multiple documents from flatbed without multiple pres...
This document is organized as a “step‐by‐step”guide to reproduce the invention in a correct way
This paper explores the ethical frames and implications of the 2014 leak of a large archive of digit...
A connecting device in a public environment looks for a trusted target device that maintains high se...
Safety sensors are used to continuously monitor the Intermediate Transfer Member (ITM) drum for poss...
Today, methods of purifying air have become small and USB‐C powered to allow for personal air purifi...
Printers usually have large beams inside that require very precise positions. The room around the pr...
Photographs are often thought to be a record of reality. Rather than being a representation, they se...
J. M. de Fuentes, L. Gonzalez-Manzano and P. Peris-Lopez have been partially supported by MINECO gra...
When scanning a document, the goal in most cases is to obtain another printed copy. However, there a...
With the magnitude of telemetry data constantly increasing, effective data analytics requires effici...
The method described below will predict printer models showing anomalous behavior by going through t...
THE world is about to witness a "techtonic" shift induced by the iPad. It is expected to result in a...