In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
We study the inapproximability of Vertex Cover and Independent Set on degree d graphs. We prove that: • Vertex Cover is Unique Games-hard to approximate to within a factor 2−(...
This paper describes a computer vision system to detect card counters and dealer errors in a game of Blackjack from an overhead stereo camera. Card counting is becoming increasingl...
We propose a method for synthesizing a “speaker mixture voice” that has both of two speakers’ individualities. We define the “speaker mixture voice” as such that 50 per...
Various methodologies for structuring the process of domain modeling have been proposed, but there are few software tools that provide automatic support for the process of construc...
Koen V. Hindriks, Stijn Hoppenbrouwers, Catholijn ...