Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
Abstract—Functional magnetic resonance images (fMRI’s) provide high-resolution datasets which allow researchers to obtain accurate delineation and sensitive detection of activa...
Xavier Descombes, Frithjof Kruggel, D. Yves von Cr...
Automatic delineation of the myocardium in real-time 3D echocardiography may be used to aid the diagnosis of heart problems such as ischaemia, by enabling quantification of wall th...
Victor S. Lempitsky, Michael Verhoek, J. Alison No...
Activity recognition is a key component for creating intelligent, multi-agent systems. Intrinsically, activity recognition is a temporal classification problem. In this paper, we...
Douglas L. Vail, Manuela M. Veloso, John D. Laffer...
— Differential Evolution (DE) is a novel evolutionary approach capable of handling non-differentiable, non-linear and multi-modal objective functions. DE has been consistently ra...