Abstract. In this paper a multi-modal method for human identification that exploits the discriminant features derived from several movement types performed from the same human is p...
Nikolaos Gkalelis, Anastasios Tefas, Ioannis Pitas
: This paper presents a Least Popularly Used buffer cache algorithm to exploit both temporal locality and content locality of I/O requests. Popular data blocks are selected as refe...
Existing distributed hash tables provide efficient mechanisms for storing and retrieving a data item based on an exact key, but are unsuitable when the search key is similar, but ...
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...
Illumination change is one of most important and difficult problems which prevent from applying face recognition to real applications. For solving this, we propose a method to comp...