Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
An idealized clustering algorithm seeks to learn a cluster-adjacency matrix such that, if two data points belong to the same cluster, the corresponding entry would be 1; otherwise ...
The Support Vector Machine (SVM) is a powerful tool for classification. We generalize SVM to work with data objects that are naturally understood to be lying on curved manifolds, ...
Suman K. Sen, Mark Foskey, James Stephen Marron, M...
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....