88
Voted
ACSC
9 years 10 months ago
2015 IEEE
In this paper, we introduce a new method of data transformation for finger vein recognition system. Our proposed method uses kernel mapping functions to map the data before perfor...
ACSC
9 years 10 months ago
2015 IEEE
The semantic representation and modeling of legal texts has for a long time been a significant research challenge. While approaches from both, software engineering and semantic m...
78
Voted
ACSC
9 years 10 months ago
2015 IEEE
Protecting software copyright has been an issue since the late 1970’s, and software license validation has been a primary method employed in an attempt to minimise software pira...
77
Voted
ACSC
9 years 10 months ago
2015 IEEE
Schema mapping is essential to manage schema heterogeneity among different sources. Schema mapping can be conducted by using machine learning algorithms or by knowledge engineerin...
77
Voted
ACSC
9 years 10 months ago
2015 IEEE
Moving clusters represent groups of objects that move together, for instance, groups of people evacuating a building. However, because moving clusters are composed of lists of clu...
|