Moving clusters represent groups of objects that move together, for instance, groups of people evacuating a building. However, because moving clusters are composed of lists of clu...
The data of interest are assumed to be represented as Ndimensional real vectors, and these vectors are compressible in some linear basis B, implying that the signals can be recons...
Protecting software copyright has been an issue since the late 1970’s, and software license validation has been a primary method employed in an attempt to minimise software pira...
In this paper, we introduce a new method of data transformation for finger vein recognition system. Our proposed method uses kernel mapping functions to map the data before perfor...
Traditional static topic models mainly focus on the statistical correlation between words, but ignore the sentiment tendency and the temporal properties which may have great effec...
Xi Ding, Lan-Shan Zhang, Ye Tian, Xiangyang Gong, ...
The semantic representation and modeling of legal texts has for a long time been a significant research challenge. While approaches from both, software engineering and semantic m...
Random walks have been proposed as a simple method of efficiently searching, or disseminating information throughout, communication and sensor networks. In nature, animals (such a...
Schema mapping is essential to manage schema heterogeneity among different sources. Schema mapping can be conducted by using machine learning algorithms or by knowledge engineerin...
Sarawat Anam, Yang Sok Kim, Byeong Ho Kang, Qing L...
Return-Oriented Programming (ROP) is an effective attack technique that can escape modern defenses such as DEP. ROP is based on repeated abuse of existing code snippets ending wi...
Existing malware defenses are primarily reactive in nature, with defenses effective only on malware that has previously been observed. Unfortunately, we are witnessing a generati...