When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
Abstract With the proliferation of Geographic Information Systems (GIS) and spatial resources over the Internet, there is an increasing demand for robust geospatial information ser...
The `SemanticLIFE' system is designed to store, manage and retrieve ones lifetime's information entities. It enables the acquisition and storage of data while giving ann...
Mansoor Ahmed, Hanh Huu Hoang, Muhammad Shuaib Kar...
Many machine learning algorithms for clustering or dimensionality reduction take as input a cloud of points in Euclidean space, and construct a graph with the input data points as...
This paper proposes an approach to classification of adjacent segments of a time series as being either of classes. We use a hierarchical model that consists of a feature extract...