It is common practice to build complex systems from disparate sub-systems. Model composability is concerned with techniques for developing a whole model of a system from the model...
Research in face-to-face communication has identified a variety of largely unconscious patterns of behavior that are used by collaborators to coordinate their conversation, build ...
Due to the widespread trust threat under the open and dynamic Internet environment, the computer community has endeavored to engage in the studies of technologies for protecting a...
In this paper, we propose a novel on-line handwritten signature verification method. Firstly, the pen-position parameters of the on-line signature are decomposed into multiscale si...
In today’s globally networked society, there is a dual demand on both information sharing and information protection. A typical scenario is that two parties wish to integrate the...