This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
A novel method and a framework called Memory-Based Forecasting are proposed to forecast complex and timevarying natural patterns with the goal of supporting experts' decision...
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
Similarity search in image database is commonly implemented as nearest-neighbor search in a feature space of the images. For that purpose, a large number of different features as ...
In the world of pervasive computing where large management systems, as well as small devices, all become interconnected, the problem of the configuration and management of network...