Chun-Shun Tseng

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and receiver adopt a mirroring process based on an improved Hebbian rule that uses identical random inputs to separately train on their reciprocal outputs to generate a pair of exactly(More)
⎯This paper presents an improved multi-object segmentation algorithm based on probabilistic labeling. First, a critical look is focused on utilizing vector calculus operator and combinational operator to rewrite Dirichlet integral into a matrix form, and boundary condition is defined to obtain the needed harmonic function. The only unique parameter β that(More)
  • 1