In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
Web usage mining is the process of extracting interesting patterns from web logs. This paper proposes an IPA (Integrating Path traversal patterns and Association rules) model for ...
In this paper, we propose a new method, video repairing, to robustly infer missing static background and moving foreground due to severe damage or occlusion from a video. To recov...
Jiaya Jia, Tai-Pang Wu, Yu-Wing Tai, Chi-Keung Tan...
In this work, we present a novel approach to face recognition which considers both shape and texture information to represent face images. The face area is first divided into small...
Abstract. Under dimly lit condition, it is difficult to take a satisfactory image in long exposure time with a hand-held camera. Despite the use of a tripod, moving objects in the ...