Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
The provision of embedding neural networks into software applications can enable variety of Artificial Intelligence systems for individual users as well as organizations. Previous...
We describe a new system for building Tablet PC-based classroom software. The system, called SLICE, is built for extensibility, using a unique "explicit state" model. Ap...
Sam Kamin, Michael Hines, Chad Peiper, Boris Capit...
Over the past decade, multiple-instance learning (MIL)
has been successfully utilized to model the localized
content-based image retrieval (CBIR) problem, in which a
bag corresp...
Wu-Jun Li (Hong Kong University of Science and Tec...