Picture for Mario Frank

Mario Frank

Role Mining with Probabilistic Models

Add code
Jan 04, 2013
Figure 1 for Role Mining with Probabilistic Models
Figure 2 for Role Mining with Probabilistic Models
Figure 3 for Role Mining with Probabilistic Models
Figure 4 for Role Mining with Probabilistic Models
Viaarxiv icon

Mining Permission Request Patterns from Android and Facebook Applications (extended author version)

Add code
Oct 08, 2012
Figure 1 for Mining Permission Request Patterns from Android and Facebook Applications (extended author version)
Figure 2 for Mining Permission Request Patterns from Android and Facebook Applications (extended author version)
Figure 3 for Mining Permission Request Patterns from Android and Facebook Applications (extended author version)
Figure 4 for Mining Permission Request Patterns from Android and Facebook Applications (extended author version)
Viaarxiv icon

Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication

Add code
Oct 08, 2012
Figure 1 for Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
Figure 2 for Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
Figure 3 for Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
Figure 4 for Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
Viaarxiv icon

Selecting the rank of truncated SVD by Maximum Approximation Capacity

Add code
Jun 08, 2011
Figure 1 for Selecting the rank of truncated SVD by Maximum Approximation Capacity
Figure 2 for Selecting the rank of truncated SVD by Maximum Approximation Capacity
Figure 3 for Selecting the rank of truncated SVD by Maximum Approximation Capacity
Figure 4 for Selecting the rank of truncated SVD by Maximum Approximation Capacity
Viaarxiv icon