Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Creating a simulation of a large enterprise system by manually coding all the details into a simulator tool is not just time consuming, but yields a system that is difficult to ma...
Gregory A. Harrison, David S. Maynard, Eytan Polla...
Information relevance is an important issue in information access techniques. A solution for improving this relevance is the personalization or adaptation of the answers provided ...
The content and searching method of knowledge base are lack of the consideration of user requirements, it is difficult for the user to select the knowledge satisfy with the user r...
Distributed computing is a very broad and active research area comprising fields such as cluster computing, computational grids, desktop grids and peer-to-peer (P2P) systems. Unf...