Manyindustrial processes involve makingparts with an assemblyof machines, where each machinecarries out an operation on a part, and the finished product requires a wholeseries of ...
Using a distributed algorithm rather than a centralized one can be extremely beneficial in large search problems. In addition, the incorporation of machine learning techniques lik...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Background: Horizontal gene transfer (HGT) has allowed bacteria to evolve many new capabilities. Because transferred genes perform many medically important functions, such as conf...
Automatic video search based on semantic concept detectors has recently received significant attention. Since the number of available detectors is much smaller than the size of h...