Abstract Consumers are increasingly demanding products that closely match their individual preferences, and advances in manufacturing and information technologies have made it poss...
We propose a new method for the Lambertian Shape From Shading (SFS) problem based on the notion of Crandall-Lions viscosity solution. This method has the advantage of requiring the...
Emmanuel Prados, Fabio Camilli, Olivier D. Faugera...
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved sc...
Abstract. Maximum likelihood (ML) is an increasingly popular optimality criterion for selecting evolutionary trees [Felsenstein 1981]. Finding optimal ML trees appears to be a very...
Assembling a gene from candidate exons is an important problem in computational biology. Among the most successful approaches to this problem is spliced alignment, proposed by Gelf...
— The differential encoding/decoding setup introduced by Kiran et al, Oggier et al and Jing et al for wireless relay networks that use codebooks consisting of unitary matrices is...
The dorsal column nuclei, cuneatus and gracilis, receive somesthetic information impinging on projection cells and local inhibitory interneurons. The presence of these interneuron...
Recently, Yang et al. improved Yang and Shieh's two password authentication schemes to withstand Sun and Yeh's forgery attacks. However, Kim et al. pointed out that Yang...
The n-dimensional folded hypercube FQn, a variation of the hypercube proposed by Ahmed et al. [A. El-Amawy, S. Latifi, Properties and performance of folded hypercubes, IEEE Transa...
In 2006, Smith et al. published a new table of constant weight codes, updating existing tables originally created by Brouwer et al. This paper improves upon these results by fill...