Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
Polar graphs are a common generalization of bipartite, cobipartite, and split graphs. They are defined by the existence of a certain partition of vertices, which is NPcomplete to ...
Tinaz Ekim, Pavol Hell, Juraj Stacho, Dominique de...
The instantaneous amplitude, phase, and frequency (APF) characterize a nonstationary signal on a fundamental level. In this paper, we seek to obtain a consistent multidimensional ...
This paper treats automated detection of road and lane boundaries by fusing information from forwardlooking optical and active W-band radar imaging sensors mounted on a motor vehi...
Shape skeleton extraction is a fundamental preprocessing task in shape-based pattern recognition. This paper presents a new algorithm for fast and precise extraction of kinematic ...