This paper concerns the generalizability of biometric identification results from small-sized closed systems to larger open systems. Many researchers have claimed high identificati...
Michael Gibbons, Sungsoo Yoon, Sung-Hyuk Cha, Char...
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
Open learner models (OLM) are learner models that are accessible to the learner they represent. Many examples now exist, often with the aim of prompting learner reflection on their...
In the open route version of the well-known vehicle routing problem, vehicles are not required to return to the depot; or if they are required, then they return by traveling the sa...
Abstract: The high complexity of the faulty behavior observed in DRAMs is caused primarily by the presence of internal floating nodes in defective DRAMs. This paper describes a ne...