Abstract— This paper investigates the implementation of highradix multiplication based on the Electron Counting (EC) paradigm in Single Electron Tunneling (SET) technology. First...
This paper evaluates the effectiveness of keypoint methods for content-based protection of digital images. These methods identify a set of “distinctive” regions (termed keypoi...
We describe an automated system that classifies gender by utilising a set of human gait data. The gender classification system consists of three stages: i) detection and extraction...
Abstract. The NValue constraint counts the number of different values assigned to a vector of variables. Propagating generalized arc consistency on this constraint is NP-hard. We ...
A key difficulty in the maintenance and evolution of complex software systems is to recognize and understand the implicit dependencies that define contracts that must be respecte...