Abstract. We address one of the most fundamental problems concerning the RSA cryptosystem: does the knowledge of the RSA public and secret key-pair (e, d) yield the factorization o...
In this paper, we propose an energy-based technique to track the power of multiple simultaneous speakers using an ad hoc microphone array with unknown microphone positions. By con...
We present a decentralized adaptive filtering algorithm where each agent acts selfishly to maximize its payoff. Agents are only aware of the actions of other agents within their...
Normalized Cut is a widely used technique for solving a
variety of problems. Although finding the optimal normalized
cut has proven to be NP-hard, spectral relaxations can
be ap...
Linli Xu (University of Alberta), Wenye Li (Univer...
In this paper we define a Topological Tree (TT) as a knowledge representation method that aims to describe important visual and spatial features of image regions, namely the color...
Rita Cucchiara, Costantino Grana, Andrea Prati, St...