With the increasing capabilities of hardware for 3D graphics and network, 3D multi-user environments get more and more interesting for e-business, entertainment and cooperative wo...
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
In the paper, we consider a preference heterogeneity problem in large-scale multicast applications. Abundant content, data type and diverse members' interests naturally lead ...
We show how a generic feature selection algorithm returning strongly relevant variables can be turned into a causal structure learning algorithm. We prove this under the Faithfuln...
Tomographic reconstruction from positron emission tomography (PET) data is an ill-posed problem that requires regularization. An attractive approach is to impose an 1-regularizatio...
J. Verhaeghe, Dimitri Van De Ville, I. Khalidov, Y...