This paper addresses the indexing and retrieval of mathematical symbols from digitized documents. The proposed approach exploits Shape Contexts (SC) to describe the shape of mathe...
Sub-threshold operation is a compelling approach for energyconstrained applications, but increased sensitivity to variation must be mitigated. We explore variability metrics and t...
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
New results are presented for the prediction of secondary structure information for protein sequences using Hidden Markov Models (HMMs) evolved using a Genetic Algorithm (GA). We a...
A method of `network filtering' has been proposed recently to detect the effects of certain external perturbations on the interacting members in a network. However, with larg...