In order to provide certified security services we must provide indicators that can measure the level of assurance that a complex business process can offer. Unfortunately the fo...
This paper presents a postprocessing technique based on the theory of projections onto convex sets (POCS) to reduce the blocking artifacts in low bit rate BDCT-coded images. In the...
Yoon Kim, Chun-Su Park, Kyunghun Jang, Sung-Jea Ko
Abstract: This paper presents a new net-reduction methodology to facilitate the analysis of large workflow models. We propose an enhanced algorithm based on reducible subnet identi...
It was prescriptive that an image matrix was transformed into a vector before the kernel-based subspace learning. In this paper, we take the Kernel Discriminant Analysis (KDA) alg...
Shuicheng Yan, Dong Xu, Lei Zhang, Benyu Zhang, Ho...
Wireless sensor networks have mainly been designed for information-collecting purposes, such as habitat monitoring, product process tracing, battlefield surveillance, etc. In orde...