We present the Iterated-Tverberg algorithm, the first deterministic algorithm for computing an approximate centerpoint of a set S ∈ Rd with running time sub-exponential in d. T...
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Using synthetic characters to support children’s personal, social and emotional education requires that the emotional response elicited from the children is that desired by educa...
Lynne E. Hall, Sarah Woods, Marc Hall, Dieter Wolk...
This paper focuses on fuzzy image denoising techniques. In particular, we investigate the usage of fuzzy set theory in the domain of image enhancement using wavelet thresholding. W...
Stefan Schulte, Bruno Huysmans, Aleksandra Pizuric...