Statistical classification methods can be applied on images of historical manuscript in order to characterize the various kinds of inks used. As these methods do not require destr...
Vasiliki Kokla, Alexandra Psarrou, Vassilis Konsta...
We present the results of a feasibility study using shared, existing, network-accessible infrastructure for repository replication. We utilize the SMTP and NNTP protocols to replic...
The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model dating back to Shannon [24] and has seen frequent use in proving the security of various cryptographi...
The field of Differential Evolution (DE) has demonstrated important advantages in single objective optimization. To date, no previous research has explored how the unique characte...
In this paper, the stability of equilibrium formations for multiple unicycle systems in cyclic pursuit is studied in detail. The cyclic pursuit setup is particularly simple in tha...
Joshua A. Marshall, Mireille E. Broucke, Bruce A. ...