XML is rapidly becoming one of the most widely adopted technologies for information exchange and representation. As the use of XML becomes more widespread, we foresee the developme...
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
A novel method and a framework called Memory-Based Forecasting are proposed to forecast complex and timevarying natural patterns with the goal of supporting experts' decision...
Similarity search in image database is commonly implemented as nearest-neighbor search in a feature space of the images. For that purpose, a large number of different features as ...
In the world of pervasive computing where large management systems, as well as small devices, all become interconnected, the problem of the configuration and management of network...