—In this paper, we propose a new method for three dimensional rotation-free recognition of characters in scene. In the proposed method, we employ the Modified Quadratic Discrimi...
: Since the advent of Gnutella, Peer-to-Peer (P2P) protocols have matured towards a fundamental design element for large-scale, self-organising distributed systems. Many research e...
Brain surface conformal mapping research has been successful and this motivates our more general investigation of 3D volumetric brain harmonic mapping. By transforming the full 3D...
Yalin Wang, Xianfeng Gu, Tony F. Chan, Paul M. Tho...
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...