We consider a system with a single base station communicating with multiple users over orthogonal channels while being assisted by multiple relays. Several recent works have sugge...
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
In order to achieve both fast tracking and accurate object extraction, we present in this paper an original real-time active contour method, incorporating different feature maps i...
Joanna I. Olszewska, Christophe De Vleeschouwer, B...
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
: In this paper we propose the use of an argument-based model – ProCLAIM – that has the potential to minimize ecological impact of industrial wastewater discharges into water b...