In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
This article addresses a question regarding relevant information in a social media such as a wiki that can contain huge amount of text, written in slang or in natural language, wi...
Carlos Miguel Tobar, Alessandro Santos Germer, Jua...
Abstract. Prosody has been actively studied as an important knowledge source for speech recognition and understanding. In this paper, we are concerned with the question of exploiti...
In clinical applications where structural asymmetries between homologous shapes have been correlated with pathology, the questions of definition and quantification of ‘asymmetr...
Nicholas A. Lord, Jeffrey Ho, Baba C. Vemuri, Step...
In this paper we describe a computer aided detection (CAD) algorithm for robust detection of polyps in computed tomography (CT) colonography. The devised algorithm identifies sus...
Tarik A. Chowdhury, Ovidiu Ghita, Paul F. Whelan, ...