As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defen...
Neurons in the nervous system display a wide variety of plasticity processes. Among them are covariance based rules and homeostatic plasticity. By themselves, the first ones tend...
Despite its powerful module system, ML has not yet evolved for the modern world of dynamic and open modular programming, to which more primitive languages have adapted better so f...
Prime objects were defined as generalization of simple objects in the categories of rings (modules). In this paper we introduce and investigate what turns out to be a suitable gen...
For motion estimation (ME) and discrete cosine transform (DCT) of MPEG video encoding, content variation and perceptual tolerance in video signals can be exploited to gracefully t...
Andrew Laffely, Jian Liang, Russell Tessier, Wayne...