Abstract. We present a straightforward way to use temporal decorrelation as preprocessing in linear and post-nonlinear independent component analysis (ICA) with higher order statis...
Spoofing source IP addresses is always utilized to perform Distributed Denial-of-Service (DDoS) attacks. Most of current detection and prevention methods against DDoS ignore the i...
In this paper we present a “lightweight” visual formalism that can be used to examine the state space complexity of an interface. The method can form a basis for designing, te...
Formal methods are a nice idea, but the size and complexity of real systems means that they are impractical. We propose that a reasonable alternative to attempting to specify and ...
The method herein proposed detects text lines on handwritten pages which may include either lines oriented in several directions, erasures, or annotationsbetween main lines. The m...