Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
The performance of supervised learners depends on the presence of a relatively large labeled sample. This paper proposes an automatic ongoing learning system, which is able to inco...
Abstract. We introduce a novel implicit approach for single object segmentation in 3D images. The boundary surface of this object is assumed to contain two known curves (the constr...
The research reported in this paper employed Narrative Inquiry in an innovative way in a study of the key factors that influence the career paths of information systems (IS) profe...
Abstract. Localized QoS routing techniques were proposed to achieve acceptable performance without exchanging global state information over the network. In such techniques, the ing...
Khaled M. F. Elsayed, Hassan Fadel, Amin M. Nassar