We present a general method of catadioptric sensor design for realizing prescribed projections. Our method makes use of geometric distributions in 3-dimensional space, which are g...
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
— Recent years have witnessed the proliferation of a new class of devices, commonly referred to as Networked Embedded Devices. Their increasingly low cost and small size make the...
In Twenty Problems in the Theory of Cellular Automata, Stephen Wolfram asks “how common computational universality and undecidability [are] in cellular automata.” This papers p...
Abstract. A reformulation of a mathematical program is a formulation which shares some properties with, but is in some sense better than, the original program. Reformulations are i...