Wireless sensor networks cannot have meaningful work without connecting with TCP/IP based network. In this paper, we analyze and compare all the existing solutions for connecting s...
Shu Lei, Jin Wang, Hui Xu, Jinsung Cho, Sungyoung ...
Recently, based on RSA and discrete logarithm with composite modulus, Huang and Chang proposed two multisignature schemes with distinguished signing authority and claimed that the...
The deep Boltzmann machine is a powerful model that extracts the hierarchical structure of observed data. While inference is typically slow due to its undirected nature, we argue ...
Linear and Quadratic Discriminant Analysis have been used widely in many areas of data mining, machine learning, and bioinformatics. Friedman proposed a compromise between Linear ...
Attempts to dereference null result in an exception or a segmentation fault. Hence it is important to know those program points where this might occur and prove the others (or the...