Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
Abstract. We present a method to generate glyphs which convey complex information in graphical form. A glyph has a linear geometry which is specified using geometric operations, e...
Greg Pintilie, Brigitte Tuekam, Christopher W. V. ...
Although tabular reinforcement learning (RL) methods have been proved to converge to an optimal policy, the combination of particular conventional reinforcement learning techniques...
Abstract. We consider a finitary procedural programming language (finite data-types, no recursion) extended with parallel composition and binary semaphores. Having first shown t...
This paper presents an unsupervised fuzzy-kernel learning vector quantization algorithm called FKLVQ. FKLVQ is a batch type of clustering learning network by fusing the batch learn...