Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
— This paper addresses recognition of human actions under view changes. We explore self-similarities of action sequences over time and observe the striking stability of such meas...
Imran N. Junejo, Emilie Dexter, Ivan Laptev, Patri...
Abstract. The Arnoldi method is currently a very popular algorithm to solve large-scale eigenvalue problems. The main goal of this paper is to generalize the Arnoldi method to the ...
—We consider a communication channel with two transmitters and one receiver, with an underlying rate region which is approximated as a general pentagon. Different from the Gaussi...
NCBI’s Conserved Domain Database (CDD) is a resource for the annotation of protein sequences with the location of conserved domain footprints, and functional sites inferred from...
Aron Marchler-Bauer, Shennan Lu, John B. Anderson,...