In this paper we show that a large class of cut-elimination methods can be analyzed by clause terms representing sets of characteristic clauses extractable from the original proof...
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
In this paper we present an online method for managing a goaloriented buffer partitioning in the distributed memory of a network of workstations. Our algorithm implements a feedba...
This paper proposes a relay-based scheme where a fixed number of relays are utilized to design an OFDM cooperative protocol. By exploiting limited feedback from the destination ter...
W. Pam Siriwongpairat, Ahmed K. Sadek, K. J. Ray L...
Traditional image retrieval methods require a "query image" to initiate a search for members of an image category. However, when the image database is unstructured, and ...