Abstract. In a component-based system, connectors are used to compose components. Connectors should have a semantics that makes them simple to construct and use. At the same time, ...
This paper presents an oblivious real-time video watermarking scheme in which extended m-sequences is selected as watermark pattern. The good balance property of extended m-sequen...
— Inspired by Hebb’s cell assembly theory about how the brain worked, we have developed a function localization neural network (FLNN). The main part of a FLNN is structurally t...
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Dimension reduction is a crucial step for pattern recognition and information retrieval tasks to overcome the curse of dimensionality. In this paper a novel unsupervised linear dim...
Yanwei Pang, Lei Zhang, Zhengkai Liu, Nenghai Yu, ...