A study is carried out of the elementary theory of quotients of symmetric groups in a similar spirit to [10]. Apart from the trivial and alternating subgroups, the normal subgroup...
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
This paper gives a practical and accurate algorithm for the computation of the quadrifocal tensor and extraction of camera matrices from it. Previous methods for using the quadrifo...
Segmentation and tracking of objects in video sequences is important for a number of applications. In the supervised variant, segmentation can be achieved by modelling the probabi...
This is the second part of a tutorial discussing the experimental protocol issues in Testing the Torah Code Hypothesis. The principal concept is the test statistic which is used t...