Conventional contour tracking algorithms with level set often use generative models to construct the energy function. For tracking through cluttered and noisy background, however,...
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
My main objective is to point out a fundamental weakness in the conventional conception of computation and suggest a promising way out. This weakness is directly related to a gross...
: this document presents a generic model capturing the essential structural and behavioral characteristics of network components in the light of fault management. The generic model...
Abstract— A common framework for formalization of statetransition computation models is presented based on a general theory for studying the interrelationships between specifica...