Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 06 Oct 2024Bibliometrics
Skip Table Of Content Section
article
Deterministic and Unambiguous Families within Recognizable Two-dimensional Languages
Pages 143–166

Recognizable two-dimensional languages (REC) are defined by tiling systems that generalize to two dimensions non-deterministic finite automata for strings. We introduce the notion of deterministic tiling system and the corresponding family of languages (...

article
Feature Selection via Maximizing Fuzzy Dependency
Pages 167–181

Feature selection is an important preprocessing step in pattern analysis and machine learning. The key issue in feature selection is to evaluate quality of candidate features. In this work, we introduce a weighted distance learning algorithm for feature ...

article
Learning Behaviors of Functions
Pages 183–198

We consider the inductive inference model of Gold [15]. Suppose we are given a set of functions that are learnable with certain number of mind changes and errors. What properties of these functions are learnable if we allow fewer number of mind changes ...

article
Adaptive Rough Entropy Clustering Algorithms in Image Segmentation
Pages 199–231

High quality performance of image segmentation methods presents one leading priority in design and implementation of image analysis systems. Incorporating the most important image data information into segmentation process has resulted in development of ...

article
Design of a Hybrid Quantizer with Variable Length Code
Pages 233–256

In this paper a new model for compression of Laplacian source is given. This model consists of hybrid quantizer whose output levels are coded with Golomb-Rice code. Hybrid quantizer is combination of uniform and nonuniform quantizer, and it can be ...

article
Tree Structure Based Data Hiding for Progressive Transmission Images
Pages 257–275

Progressive image transmission (PIT) is supported by several encoders such as SPIHT, JPEG2000 and so on. However, few of data hiding scheme for progressive transmission images is designed. In this paper, tree-structure-based data hiding for set ...

article
On the Insecurity of an Identity Based Proxy Re-encryption Scheme
Pages 277–281

At Pairing'07, Matsuo proposed two proxy re-encryption schemes: proxy re-encryption fromCBE to IBE and IBE to IBE. Now both schemes have been standardized by P1363.3workgroup. In this paper, we show that their identity based proxy re-encryption scheme ...

article
Free-Choice Petri Nets without Frozen Tokens, and Bipolar Synchronization Systems
Pages 283–320

Bipolar synchronization systems (BP-systems) constitute a class of coloured Petri nets, well suited for modelling the control flow of discrete dynamical systems. Every BP-system has an underlying ordinary Petri net, a T-system. It further has a second ...

article
Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations
Pages 321–336

In order to provide large embedding capacity and to minimize distortion for the stego-image, a steganographic method using multi-pixel differencing is presented in this paper. It takes into consideration four pixels of a block, and the differences ...

Comments