Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
Abstract. A major challenge in pervasive computing is to learn activity patterns, such as bathing and cleaning from sensor data. Typical sensor deployments generate sparse datasets...
The widespread adoption of mobile electronic devices and the advent of wearable computing has encouraged the development of compact alternatives to the keyboard and mouse. These i...
The performance of a multihop wireless network is typically affected by the interference caused by transmissions in the same network. In a statistical fading environment, the inte...
Abstract: We consider lossy source coding when side information affecting the distortion measure may be available at the encoder, decoder, both, or neither. For example, such disto...