Support Vector Learning Machines (SVM) are nding application in pattern recognition, regression estimation, and operator inversion for ill-posed problems. Against this very genera...
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
This paper presents a technique to remove image artefacts, formed under the cyclic additive group Zp, during the inverse Radon reconstruction from primedimensioned discrete projec...
This paper introduces an edge-based object recognition method that is robust with respect to clutter, occlusion and object deformations. The method combines the use of local featu...
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control th...