In this paper, a data-driven extension of the variational algorithm is proposed. Based on a few selected sensors, target tracking is performed distributively without any informati...
Hichem Snoussi, Jean-Yves Tourneret, Petar M. Djur...
The IETF has developed a network configuration management protocol called NETCONF which was published as proposed standard in 2006. The NETCONF protocol provides mechanisms to in...
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
—Thus far, sparse representations have been exploited largely in the context of robustly estimating functions in a noisy environment from a few measurements. In this context, the...
Self-assessment is a crucial component of learning. Creating effective questions is time-consuming, however, because it may require considerable resources and the skill of critica...