Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
NK models provide a family of tunably rugged fitness landscapes used in a wide range of evolutionary computation studies. It is well known that the average height of local optima...
Benjamin Skellett, Benjamin Cairns, Nicholas Geard...
The appearance manifold [WTL 06] is an efficient approach for modeling and editing time-variant appearance of materials from the BRDF data captured at single time instance. Howeve...
Su Xue, Jiaping Wang, Xin Tong, Qionghai Dai, Bain...