Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
As environments become smart in accordance with advances in ubiquitous computing technology, researchers are struggling to satisfy users' diverse and sophisticated demands. Th...
Jin Choi, Yong-il Cho, Kyusung Cho, Su-jung Bae, H...
Iris recognition is a biometric technique which uses unique iris patterns between the pupil and sclera. The advantage of iris recognition lies in high recognition accuracy; howeve...
In the usual models of cooperative game theory, the outcome of a coalition formation process is either the grand coalition or a coalition structure that consists of disjoint coali...
Pyramid annotation makes it possible to evaluate quantitatively and qualitatively the content of machine-generated (or human) summaries. Evaluation methods must prove themselves a...