In order to reduce key sizes and bandwidth, several LFSRbased (linear feedback shift register) public key cryptosystems and signature schemes have been proposed. Digital signature...
In this paper, we present a robust road detection and tracking method based on a condensation particle filter for real-time video-based navigation applications. The image is divide...
Given a phylogenetic tree for a family of tandemly repeated genes and their signed order on the chromosome, we aim to find the minimum number of inversions compatible with an evo...
This paper focuses on technologies that enable meaningful, constructionist interaction in collaborative music environments. In particular, it describes the design and implementati...
Conor McCarthy, James Bligh, Kevin Jennings, Brend...
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...