Abstract--This paper describes performance bounds for compressed sensing (CS) where the underlying sparse or compressible (sparsely approximable) signal is a vector of nonnegative ...
Maxim Raginsky, Rebecca Willett, Zachary T. Harman...
—Stringent cost and energy constraints impose the use of low-cost and low-power radio transceivers in large-scale wireless sensor networks (WSNs). This fact, together with the ha...
Chromatin modification (CM) is a set of epigenetic processes that govern many aspects of DNA replication, transcription and repair. CM is carried out by groups of physically inter...
Andrei L. Turinsky, Brian Turner, Rosanne C. Borja...
Now in its 10th year, the Gramene database (http:// www.gramene.org) has grown from its primary focus on rice, the first fully-sequenced grass genome, to become a resource for maj...
Ken Youens-Clark, Edward S. Buckler, Terry M. Cass...
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...