The temporal elements of users’ information requirements are a continually confounding aspect of digital library design. No sooner have users’ needs been identified and suppor...
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Abstract. We consider the classification problem on a finite set of objects. Some of them are labeled, and the task is to predict the labels of the remaining unlabeled ones. Such...
Many applications in image analysis are concerned with the temporal evolution of shapes in video sequences. In situations involving low-contrast, low-quality images, human aid is o...
Shantanu H. Joshi, Anuj Srivastava, Washington Mio