We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
We describe a new computational approach to stylize the colors of an image by using a reference image. During processing, we take characteristics of human color perception into ac...
Hierarchical modularity is a familiar characteristic of a large class of natural dynamical systems. A normal interpretation of modularity is that interactions between subsystems a...
In this paper we describe a novel method to integrate interactive visual analysis and machine learning to support the insight generation of the user. The suggested approach combine...
Raphael Fuchs, Jürgen Waser, Meister Eduard GrÃ...