Abstract. A method of human skin region detection based on PCNN is proposed in this paper. Firstly, the input origin image is translated from RGB color space to YIQ color space, an...
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
We present various techniques for improving the time and space efficiency of symbolic model checking for system requirements specified as synchronous finite state machines. We use...
William Chan, Richard J. Anderson, Paul Beame, Dav...
An agent-based modeling of virtual ecosystems is presented. A virtual ecosystem develops by plant competition according to biologically inspired rules and tends to reach stability...
This paper investigates cluster formation in decentralized sensor grids and focusses on predicting when the cluster formation converges to a stable configuration. The traffic volum...