For post incident investigation a complete reconstruction of an event is needed based on surveillance footage of the crime scene and surrounding areas. Reconstruction of the wherea...
Michael J. Metternich, Marcel Worring, Arnold W. M...
: Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used bio...
The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibi...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
We present the first uniquely represented data structure for an external memory model of computation, a B-tree analogue called a B-treap. Uniquely represented data structures repre...
Nonnegative matrix factorization (NMF) is a versatile model for data clustering. In this paper, we propose several NMF inspired algorithms to solve different data mining problems....