Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
Current online stores suffer from a cardinal problem. There are too many products to offer, and customers find themselves lost due to the vast selection. As opposed to traditional ...
This paper presents a simulation study carried out to solve a problem of manufacturing process reengineering. The specific company in which the study took place is a medium size m...
The reasons why users tag have remained mostly elusive to quantitative investigations. In this paper, we distinguish between two types of motivation for tagging: While categorizers...
This survey covers the historical development and current state of the art in image understanding for iris biometrics. Most research publications can be categorized as making thei...
Kevin W. Bowyer, Karen Hollingsworth, Patrick J. F...