Signature identification and verification has been a topic of interest and importance for many years in the area of biometrics. In this paper we present an effective method to per...
Stephane Armand, Michael Blumenstein, Vallipuram M...
Machine learning methods are often used to classify objects described by hundreds of attributes; in many applications of this kind a great fraction of attributes may be totally irr...
Miron B. Kursa, Aleksander Jankowski, Witold R. Ru...
Background: Recent advances and automation in DNA sequencing technology has created a vast amount of DNA sequence data. This increasing growth of sequence data demands better and ...
A. K. M. A. Baten, Bill C. H. Chang, Saman K. Halg...
Abstract— Correct and efficient estimation of the Hurst parameter of long-range dependent (LRD) video traces is important in traffic analysis. The low computational cost and th...
Nikola Cackov, Zelimir Lucic, Momcilo Bogdanov, Lj...
We focus in this paper on Internet flows, consider their contributions to the overall traffic per time unit or bin, and perform a multi-scale and multi-protocol analysis to explor...