Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Autonomous underwater vehicles (AUVs) have great value as platforms for sensors. While traditional AUVs have been large platforms that tend to operate alone or in very small group...
Michael R. Frater, Michael J. Ryan, Robin M. Dunba...
Searching moving object trajectories of video databases has been applied to many fields, such as video data analysis, content-based video retrieval, video scene classification. ...
The goal of IT governance is not only to achieve internal efficiency in an IT organization, but also to support IT's role as a business enabler. The latter is here denoted IT...
Abstract. Social tagging systems provide methods for users to categorise resources using their own choice of keywords (or "tags") without being bound to a restrictive set...
Morgan Harvey, Mark Baillie, Ian Ruthven, Mark Jam...