Recently the concept of ideal binary time-frequency masks has received attention and their optimality in terms of signalto-noise ratio has been presumed. However the optimality is...
Existing graph mining algorithms typically assume that the dataset can fit into main memory. As many large graph datasets cannot satisfy this condition, truly scalable graph minin...
This paper deals with the problem of author identification. The Common N-Grams (CNG) method [6] is a language-independent profile-based approach with good results in many author i...
We present an identification and authentication system based on hand modality which is part of a reference system for all modalities developed within the Biosecure consortium. It...
In this paper, we study SQL queries with aggregate subqueries that share common tables and conditions with the outer query. While several approaches can deal with such queries, th...