One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Different researches suggest that inner facial features are not the only discriminative features for tasks such as person identification or gender classification. Indeed, they have...
Feature tracking algorithms for instationary vector fields are usually based on a correspondence analysis of the features at different time steps. This paper introduces a method ...
In this article we analyze the combination of ACOhg, a new metaheuristic algorithm, plus partial order reduction applied to the problem of finding safety property violations in co...
We analyze, in this work, the performance of a recently introduced weighted Max-SAT solver, Clone, in the Max-SAT evaluation 2007. Clone utilizes a novel bound computation based o...
Knot Pipatsrisawat, Akop Palyan, Mark Chavira, Art...