In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Linguistic steganography, as a method of text steganography, is becoming a hot spot. To investigate the linguistic steganography for Chinese text, A Chinese linguistic steganograp...
Background: Genomewide association studies have resulted in a great many genomic regions that are likely to harbor disease genes. Thorough interrogation of these specific regions ...
Ryan Abo, Jathine Wong, Alun Thomas, Nicola J. Cam...
Maintaining an asset with life-limited parts, e.g., a jet engine or an electric generator, may be costly. Certain costs, e.g., setup cost, can be shared if some parts of the asset ...
Tao Sun, Qianchuan Zhao, Peter B. Luh, Robert N. T...
This paper introduces a novel technique for palmprint recognition on the transform domain, based on combining principle component analysis (PCA) and Fourier domain. Principal Comp...
Moussadek Laadjel, Ahmed Bouridane, Fatih Kurugoll...