Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows ...
Background: Ranked gene lists from microarray experiments are usually analysed by assigning significance to predefined gene categories, e.g., based on functional annotations. Tool...
In this paper, we propose a new character generation method from on-line handwriting recognizers based on Bayesian networks. On-line handwriting recognizers are trained with handw...
We study the use of neural network algorithms in surface reconstruction from an unorganized point cloud, and meshing of an implicit surface. We found that for such applications, t...
Ioannis P. Ivrissimtzis, Won-Ki Jeong, Hans-Peter ...
1 A system of coupled differential equations is formulated which learns priors for modelling "preattentive" textures. It is derived from an energy functional consisting o...