This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The prop...
JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae M...
In this paper, three techniques to implement logical OIDs are thoroughly evaluated: hashing, B-trees and a technique called direct mapping. Among these three techniques, direct ma...
— Retrieving similar images from large repository of heterogeneous biomedical images has been a difficult research task. In this paper, we develop a retrieval system that uses H...
Image segmentation is conventionally formulated as a pixellabeling problem, in which “hard” decisions have to be made to partition pixels into regions. As image segmentation i...
Geometrical image features like edges and ridges in digital images may be extracted by convolving the images with appropriate derivatives of Gaussians. The choice of the convolutio...
J. B. Antoine Maintz, Petra A. van den Elsen, Max ...