We describe a method for computing the likelihood that a completion joining two contour fragments passes through any given position and orientation in the image plane, that is, a m...
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Cooperation among bidders in traditional auctions is generally forbidden because it is harmful to the interests of sellers. However, in a new type of online auction, the group-buy...
Jian Chen, Xilong Chen, Robert J. Kauffman, Xiping...
We introduce a deductive system Bal which models the logic of balance of opposing forces or of balance between conflicting evidence or influences. "Truth values" are int...
We propose a pixel similarity-based algorithm enabling accurate rigid registration between single and multimodal images. The method relies on the partitioning of a reference image...