In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...
Fuzzy rule base systems have been successfully used for pattern classification. These systems focus on generating a rule-base from numerical input data. The resulting rule-base ca...
As the amount of online text increases, the demand for text classification to aid the analysis and management of text is increasing. Text is cheap, but information, in the form of...
Chowdhury Mofizur Rahman, Ferdous Ahmed Sohel, Par...
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
We classify 3D aerial LiDAR scattered height data into buildings, trees, roads, and grass using the Support Vector Machine (SVM) algorithm. To do so we use five features: height, ...
Suresh K. Lodha, Edward J. Kreps, David P. Helmbol...