ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...
Background: In the last decades, microarray technology has spread, leading to a dramatic increase of publicly available datasets. The first statistical tools developed were focuse...
Paolo G. V. Martini, Davide Risso, Gabriele Sales,...
Abstract. This paper proposes a novel approach to anomalous behaviour detection in video. The approach is comprised of three key components. First, distributions of spatiotemporal ...
—We present a new method for interpolating binary images that outperforms existing techniques. Bitmapped images have a specific horizontal and vertical resolution. When we wish ...
—Relations between anisotropic diffusion and robust statistics are described in this paper. Specifically, we show that anisotropic diffusion can be seen as a robust estimation p...
Michael J. Black, Guillermo Sapiro, David H. Marim...