The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Blind blur identification in video sequences becomes more important. This paper presents a new method for identifying parameters of different blur kernels and image restoration in ...
We explore a novel motion feature as the appropriate basis for classifying or describing a number of fine motor human activities.Ourapproach not only estimates motion directions a...
Jiang Gao, Alexander G. Hauptmann, Howard D. Wactl...
The individual agents that interact in a multi-agent system typically exist along a continuum ranging from heavyweight cognitive agents (often of the "BDI" type) to light...
H. Van Dyke Parunak, Paul Nielsen, Sven Brueckner,...
CBR systems are normally used to assist experts in the resolution of problems. During the last few years, researchers have been working in the development of techniques to automate...