Search Results - "Tappert, Charles C."
-
1
Keystroke Biometric Systems for User Authentication
Published in Journal of signal processing systems (01-03-2017)“…Keystroke biometrics (KB) authentication systems are a less popular form of access control, although they are gaining popularity. In recent years, keystroke…”
Get full text
Journal Article -
2
A comparison of classifiers and features for authorship authentication of social networking messages
Published in Concurrency and computation (25-07-2017)“…Summary This paper develops algorithms and investigates various classifiers to determine the authenticity of short social network postings, an average of 20.6…”
Get full text
Journal Article -
3
Who Is the Father of Deep Learning?
Published in 2019 International Conference on Computational Science and Computational Intelligence (CSCI) (01-12-2019)“…This paper evaluates candidates for the father of deep learning. We conclude that Frank Rosenblatt developed and explored all the basic ingredients of the deep…”
Get full text
Conference Proceeding -
4
The partially observable hidden Markov model and its application to keystroke dynamics
Published in Pattern recognition (01-04-2018)“…•The partially observable hidden Markov model (POHMM) is introduced.•In keystroke dynamics, the key names partially reveal typist behavior.•The POHMM hidden…”
Get full text
Journal Article -
5
The Trend Toward Online Project-Oriented Capstone Courses
Published in Computers in the schools (01-07-2010)“…At Pace University we have been using real-world student projects in capstone computing courses for about 10 years. While the courses were conducted in a…”
Get full text
Journal Article -
6
Approximate Query Processing for Big Data in Heterogeneous Databases
Published in 2020 IEEE International Conference on Big Data (Big Data) (10-12-2020)“…Big Data analytics is used in decision making. It involves heavy computation to obtain exact answers. To alleviate this problem, approximate query processing…”
Get full text
Conference Proceeding -
7
Green computing for Internet of Things
Published in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (01-08-2020)“…Cloud computing services are used to meet the ever-growing demand for IoT. Data centers are increasingly becoming one of the largest consumers of energy to…”
Get full text
Conference Proceeding -
8
Fog Computing and the Internet of Things (IoT): A Review
Published in 2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (01-06-2021)“…IoT integration with cloud brings about numerous benefits to devices that operate on heterogeneous platforms. IoT-based applications generate massive data from…”
Get full text
Conference Proceeding -
9
Energy Consumption for IoT Streaming Applications
Published in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (01-08-2020)“…Usage of Internet of Things (IoT) devices are growing rapidly, resulting in the evolution of IoT infrastructure and efficient energy consumption. Organizations…”
Get full text
Conference Proceeding -
10
Survey of the use of digital technologies to combat COVID-19
Published in 2020 IEEE International Conference on Big Data (Big Data) (10-12-2020)“…As the world continues to encounter challenges related to public health and economic well-being, technology and big data can be used to carry out analyses and…”
Get full text
Conference Proceeding -
11
Federated Query processing for Big Data in Data Science
Published in 2019 IEEE International Conference on Big Data (Big Data) (01-12-2019)“…As the number of databases continues to grow data scientists need to use data from different sources to run machine learning algorithms for analysis. Data…”
Get full text
Conference Proceeding -
12
Integrating Polystore RDBMS with Common In-Memory Data
Published in 2020 IEEE International Conference on Big Data (Big Data) (10-12-2020)“…A polystore system is composed of multiple heterogeneous databases which are used to store data that best suites its features for faster processing and…”
Get full text
Conference Proceeding -
13
Performance of databases in IoT applications
Published in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (01-08-2020)“…IoT devices have become necessary today. As technology grows, the need for reliable, secure, and efficient applications has become essential. To have an active…”
Get full text
Conference Proceeding -
14
Brain Signal Authentication for Human-Computer Interaction in Virtual Reality
Published in 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) (01-08-2019)“…The purpose of this research was to determine whether active portions of the brain are influenced by the presence of Virtual Reality(VR) and whether those…”
Get full text
Conference Proceeding -
15
Quantum Computing and Deep Learning Working Together to Solve Optimization Problems
Published in 2019 International Conference on Computational Science and Computational Intelligence (CSCI) (01-12-2019)“…This paper explores the use of quantum computing for solving machine learning problems more efficiently. Today's quantum computers are rather primitive, so…”
Get full text
Conference Proceeding -
16
Analysis of a Parameter-Based Computational Model of Long-Term Declarative Episodic Memory
Published in 2019 International Conference on Computational Science and Computational Intelligence (CSCI) (01-12-2019)“…While substantial progress has been made to understand the functioning of the human brain from a computational perspective, little progress has been made in…”
Get full text
Conference Proceeding -
17
Keystroke Biometric User Verification Using Hidden Markov Model
Published in 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (01-06-2016)“…Biometric systems such as fingerprint, iris, DNA became popular methods in user authentication. Compared to these biometric systems, keystroke biometric…”
Get full text
Conference Proceeding -
18
A Survey on Cloudlets, Mobile Edge, and Fog Computing
Published in 2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (01-06-2021)“…Internet of Things (IoT) continues to play a critical role with a rapid increase in connected devices. Fog computing, accompanied by the edge paradigms for…”
Get full text
Conference Proceeding -
19
Authentication and Identification Methods Used in Keystroke Biometric Systems
“…Keystroke dynamics authentication is not as widely used compared to other biometric systems. In recent years, keystroke dynamic authentication systems have…”
Get full text
Conference Proceeding -
20
Spoofing key-press latencies with a generative keystroke dynamics model
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…This work provides strong empirical evidence for a two-state generative model of typing behavior in which the user can be in either a passive or active state…”
Get full text
Conference Proceeding