A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
In this paper we show how frequent sequence mining (FSM) can be applied to data produced by monitoring distributed enterprise applications. In particular we show how we applied FSM...
One successful approach to feature extraction in face recognition problems is that of linear discriminant analysis (LDA). We examine an extension of this technique, called angular...
Raymond S. Smith, Josef Kittler, Miroslav Hamouz, ...
Abstract— We consider the problem of approximating a continuous curve by a piecewise linear one whose segments are assumed to be connected by universal joints. Rather than taking...
Web caching and content replication techniques emerged to solve performance problems related to the Web. We propose a generic non-parametric heuristic method that integrates both ...
Konstantinos Stamos, George Pallis, Charilaos Thom...