Abstract. We give improved upper bounds on the communication complexity of optimally-resilient secure multiparty computation in the cryptographic model. We consider evaluating an n...
This paper presents performance results for the design and implementation of parallel pipelined Space-Time Adaptive Processing (STAP) algorithms on parallel computers. In particul...
Alok N. Choudhary, Wei-keng Liao, Donald Weiner, P...
This poster paper describes a series of 2-3 minute radio segments called “Common Sense Computing” designed to provide common sense explanations of computing technology. Comput...
This paper presents a new method for registering computer tomography (CT) volumetric data of human bone structures relative to observations made at different times. The system we ...
Marco Andreetto, Guido Maria Cortelazzo, Luca Lucc...
This paper applies a new traffic model, iterated function systems (IFS) for network traffic modelling, to explore computer network behaviour and analyse network performance. IFS mo...