Abstract. Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption propos...
A new method of reconstructing three-dimensional (3D) tubular structures from cone-beam projections is proposed in this paper. Minimal path method is applied to detect 2D tubular ...
Learning to fly an aircraft is a complex task that requires the development of control skills and goal achievement strategies. This paper presents a behavioural cloning system tha...
This paper presents an approach for generating steering behaviors of groups of characters based on the space colonization algorithm, that has been used in the past for generating l...
Complex social and information network search becomes important with a variety of applications. In the core of these applications, lies a common and critical problem: Given a labe...
Arijit Khan, Nan Li, Xifeng Yan, Ziyu Guan, Supriy...