Abstract. In the last decade speech processing has been applied in commercially available products. One of the key reasons for its success is the identification and use of an unde...
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
We use concepts from chaos theory in order to model
nonlinear dynamical systems that exhibit deterministic behavior.
Observed time series from such a system can be embedded
into...
In this paper we introduce a novel approach for progressive transmission of three-dimensional (3D) triangular meshes. This algorithm is based on a new reversing approach of the ir...
Kernel machines have recently been considered as a promising solution for implicit surface modelling. A key challenge of machine learning solutions is how to fit implicit shape mo...