Recent work in Ontology learning and Text mining has mainly focused on engineering methods to solve practical problem. In this thesis, we investigate methods that can substantially...
Elliptic curve cryptosystems in the presence of faults were studied by Biehl, Meyer and M?uller (2000). The first fault model they consider requires that the input point P in the c...
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
— It has been the conventional assumption that, due to the superlinear dependence of leakage power consumption on temperature, and widely varying on-chip temperature profiles, a...
Yongpan Liu, Robert P. Dick, Li Shang, Huazhong Ya...
This paper explores a sketch-based interface for quickly yet accurately creating visually realistic hair for virtual characters. Recently, physically-based models have proved succ...