Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent as...
In the present contribution, the applicability of off-line handwritten signatures to the fuzzy vault construction is studied. Feature extraction is based on quantized maxima and m...
We describe an ontology for WWW summarization in Bone Marrow Transplantation that is currently under construction. It is text-based and qualifies as a grounded ontology. In additi...
This paper presents a methodology that integrates fuzzy clustering and computer simulation and demonstrates its use in modeling earthmoving operations. A simulation system (SimEar...
Early work on Case Based Reasoning reported in the literature shows the importance of soft computing techniques applied to different stages of the classical 4-step CBR life cycle. ...