Abstract. Building on the current understanding of neural architecture of the visual cortex, we present a graphical model for learning and classification of motion patterns in vid...
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
Digital photographs are replacing tradition films in our daily life and the quantity is exploding. This stimulates the strong need for efficient management tools, in which the anno...
Ming Zhao 0003, Yong Teo, Siliang Liu, Tat-Seng Ch...
Background: Tag-based techniques, such as SAGE, are commonly used to sample the mRNA pool of an organism's transcriptome. Incomplete digestion during the tag formation proces...
Russell L. Zaretzki, Michael A. Gilchrist, William...
We describe a technique for reconstructing probable occluded surfaces from 3-D range images. The technique exploits the fact that many objects possess shape symmetries that can be...