— This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks ...
Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati,...
Many complex real-world decision problems, such as planning, contain an underlying constraint reasoning problem. The feasibility of a solution candidate then depends on the consis...
Effectiveness of maintenance programs of existing concrete bridges is highly dependent on the accuracy of the deterioration parameters utilised in the asset management models of th...
T. Maheswaran, J. G. Sanjayan, David L. Dowe, Pete...
—Effective image retrieval by content from database requires that visual image properties are used instead of textual labels to properly index and recover pictorial data. Retriev...
Partial differential equations (PDEs) have been successfully applied to many computer vision and image processing problems. However, designing PDEs requires high mathematical skill...