The problem of synthesizing multivariate stationary series Y [n] = (Y1[n], . . . , YP [n])T , n ∈ Z, with prescribed non-Gaussian marginal distributions, and a targeted covarian...
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Given a large online network of online auction users and their histories of transactions, how can we spot anomalies and auction fraud? This paper describes the design and implemen...
Shashank Pandit, Duen Horng Chau, Samuel Wang, Chr...
Abstract. Currently, the method most used for gene detection calls on Affymetrix oligonucleotide arrays is provided as part of the MAS5.0 software. The MAS method uses Wilcoxon sta...
Peter Warren, Deanne Taylor, Paolo G. V. Martini, ...
Abstract: We propose a new system that is able to handle the entire Personal Dataspace of a user. A Personal Dataspace includes all data pertaining to a user on all his disks and o...
Jens-Peter Dittrich, Lukas Blunschi, Markus Fä...