Recent research works have revealed that it is not difficult to spoof an automated iris recognition system using fake iris such as contact lens and paper print etc. Therefore, it i...
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
— We target the problem of predicting resource usage in situations where the modeling data is scarce, non-stationary, or expensive to obtain. This scenario occurs frequently in c...
Abstract. This paper introduces Deft, a new multitask learning approach for rule learning algorithms. Like other multitask learning systems, the one proposed here is able to improv...
One of the primary methods of studying change in the natural and man-made environment is that of comparison of multi-date maps and images of the earth's surface. Such comparis...
Christopher B. Jones, J. Mark Ware, David R. Mille...