The paper introduces a robust spelling correction technique to deal with ill-formed input strings, including unknown parts of unknown length. In contrast to previous works, we deri...
Manuel Vilares Ferro, Juan Otero Pombo, Jesú...
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
—We present a framework for analyzing the shape deformation of structures within the human brain. A mathematical model is developed describing the deformation of any brain struct...
John Martin, Alex Pentland, Stan Sclaroff, Ron Kik...
We describe a framework for decomposing the distortion between two images into a linear combination of components. Unlike conventional linear bases such as those in Fourier or wav...
In this work, homomorphic image modeling is used to make the exhaustive block-matching algorithm (EBMA) more human vision system (HVS) aware, thus yielding visually pleasing seque...