We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
This paper investigates the application of randomized algorithms for large scale SVM learning. The key contribution of the paper is to show that, by using ideas random projections...
The research community has noted the need to retrieve the instance level of an ontology from bulk data stored in external data sources (e.g., a relational database), in order to de...
During grouping tasks for data exploration and sense-making, the criteria are normally not well-defined. When users are bringing together data objects thought to be similar in som...
Xiaohua Sun, Patrick Chiu, Jeffrey Huang, Maribeth...
In the late 1990's researchers believed that B2B markets were set to revolutionise e-procurement. New marketplaces were being created on an almost weekly basis to cater for t...