Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, -differential privacy provides one of the strongest p...
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
—This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, in...
Thread counting algorithms seek to determine from x-ray images the vertical and horizontal thread counts (frequencies) of the canvas weave comprising a painting’s support. Our s...
Don H. Johnson, Lucia Sun, C. Richard Johnson Jr.,...
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...