Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
This paper investigates novel LBP-guided active contour approaches to texture segmentation. The Local Binary Pattern (LBP) operator is well suited for texture representation, comb...
Michalis A. Savelonas, Dimitrios K. Iakovidis, Dim...
We propose a new numerical scheme for linear transport equations. It is based on a decomposition of the distribution function into equilibrium and non-equilibrium parts. We also us...
Intelligent agents provide a means to integrate various manufacturing software applications. The agents are typically executed in a computer-based collaborative environment, refer...
Although theoretical results for several algorithms in many application domains were presented during the last decades, not all algorithms can be analyzed fully theoretically. Exp...