Computational Intelligence techniques have been proposed as an efficient tool for modeling and forecasting in recent years and in various applications. Water is a basic need and as...
Ishmael S. Msiza, Fulufhelo Vincent Nelwamondo, Ts...
Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is perfor...
Vivian L. Blankers, C. Elisa van den Heuvel, Katri...
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since man...
In this paper, we propose a middleware library for efficiently developing distributed cooperative applications consisting of a large number of cellular phones with Java executors....
We propose lazy propagation as a technique for flow- and context-sensitive interprocedural analysis of programs with objects and first-class functions where transfer functions ma...