Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Complex applications in many areas, including scientific computations and business-related web services, are created from collections of components to form workflows. In many case...
Detecting shadows from images can significantly improve the performance of several vision tasks such as object detection and tracking. Recent approaches have mainly used illuminat...
Abstract. We review the use of diagrams in the UK National School Curriculum (NC) and assess it in the light of current research on childrens' graph comprehension. It is noted...
Many AI problems can be modeled as constraint satisfaction problems (CSP), but many of them are actually dynamic: the set of constraints to consider evolves because of the environ...