— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
The forecasting of stock price is one of the most challenging tasks in investment/financial decision-making since stock prices/indices are inherently noisy and non-stationary. In ...
We design algorithms for computing approximately revenue-maximizing sequential postedpricing mechanisms (SPM) in K-unit auctions, in a standard Bayesian model. A seller has K copi...
Abstract—We study a cooperative communication system consisting of two users in half duplex mode communicating with one destination over additive white Gaussian noise (AWGN). Coo...