Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Abstract. Cellular Automata are a powerful formal model for describing physical and computational processes. Qualitative analysis of Cellular Automata is in general a hard problem....
We developed a method to analyze sketch maps by GIS, and applied it to an actual case study. We found that analysis using buffer operation was more effective for sketch map analyse...
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
A new design method for non-time based tracking controller of mobile robots is presented. The new design method converts a controller designed by traditional time-based approaches ...