The variables that help make a handwritten signature a unique human identifier also provide a unique digital signature in the form of a stream of latency periods between keystrokes. This article… (More)
Much has been said in praise of self-adjusting data structures, particularly self-adjusting binary search trees. Self-adjusting trees are most suited to skewed key-access distributions as the… (More)
The purpose of fingerprint image enhancement is to improve the clarity and quality of its local features. The quality of fingerprint image determines the accuracy and reliability of minutia… (More)
The computer science discipline was born in the early 1960s. Important conferences analyzed the nature of CS, the pros and cons of what the new discipline should encompass, and whether universities… (More)
Mathematical models when simulating the behavior of physical, chemical, and biological systems often include one or more ordinary differential equations (ODEs). To study the system behavior predicted… (More)
We evaluate several sets of cyclic linear multistep formulas (CLMFs). One of these sets was derived by Tischer and Sacks-Davis. Three new sets of formulas have been derived and we present their… (More)