User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Abstract. In open and heterogeneous environments offered by the Internet, where agents are designed by different vendors, the development of standards for agent communication nee...
We describe a fast algorithm for kernel discriminant analysis, empirically demonstrating asymptotic speed-up over the previous best approach. We achieve this with a new pattern of...
As embedded systems grow increasingly complex, there is a pressing need for diagnosing and monitoring capabilities that estimate the system state robustly. This paper is based on ...
: Technology innovators face the challenge of finding representative groups of users to participate in design activities. In some cases, software applications will target an audien...