In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm. The stages that comprise the approach are training-enr...
Delivering tailor-made ERP software requires automation of screen and printed report creation to be cost effective. Screens generated directly from data structures tend to have poo...
In this paper we propose a system that annotates a user generated video based on the associated location metadata, by exploiting user-tagged image databases. An example of such a ...
This paper presents a methodology based on a variation of the Quintic Pythagorean Hodographs curves for generating smooth feasible paths for autonomous vehicles in three-dimensiona...
Armando Alves Neto, Mario Fernando Montenegro Camp...
Abstract. The effective construction of many association rule bases requires the computation of both frequent closed and frequent generator itemsets (FCIs/FGs). However, only few m...