Background: It has been long well known that genes do not act alone; rather groups of genes act in consort during a biological process. Consequently, the expression levels of gene...
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
We study the role of connectivity of communication networks in private computations under information theoretic settings. It will be shown that some functions can be computed by pr...
We present a hybrid approach to image watermarking that exploits results from both information theory and perceptual studies. Towards this purpose we use a waterfilling-type algor...