Abstract. A biometric authentication system operates by acquiring biometric data from a user and comparing it against the template data stored in a database in order to identify a ...
In realātime collaborative systems, replicated objects, shared by users, are subject to concurrency constraints. In order to satisfy these, various algorithms, qualified as opā...
This paper proposes two simple and powerful algorithms to automatically paint Celtic knots with aesthetic colors. The shape of the knot is generated from its dual graph as present...
: The Gamma-Ray scanning technique effective means for the diagnosis and identification of installations and process's problems in general and in particular in the case of dis...
Khalid Laraki, Rachad Alami, Rajaa El Morsli, Abde...
Ranking queries report the top-K results according to a user-deļ¬ned scoring function. A widely used scoring function is the weighted summation of multiple scores. Often times, u...
Mohamed A. Soliman, Ihab F. Ilyas, Davide Martinen...