We discuss fault equivalence and dominance relations for multiple output combinational circuits. The conventional definition for equivalence says that “Two faults are equivalen...
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
In this paper a view-independent head tracking system applying an Active Shape Model based particle filter is used to find precise image sections. DCTmod2 feature sequences are ex...
Abstract. Novelty detection in data stream mining denotes the identification of new or unknown situations in a stream of data elements flowing continuously in at rapid rate. This...
In the present article, we introduce a new method for identification of metabolic pathways in constraint based models that consider enzyme and substrate concentrations. It genera...
C. A. Murthy, Mouli Das, Rajat K. De, Subhasis Muk...