Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Abstract—Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about ...
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
A probabilistic deformable model for the representation of brain structures is described. The statistically learned deformable model represents the relative location of head (skull...
In a Grid computing environment, resources are shared among a large number of applications. Brokers and schedulers find matching resources and schedule the execution of the applic...
Seyed Masoud Sadjadi, Shu Shimizu, Javier Figueroa...