Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
In this work we consider a new class of Relaxation Finite Element schemes for Conservation Laws, with more stable behavior on the limit area of the relaxation parameter. Combine t...
Hyper-Resolution, a new technique for super-resolution reconstruction of images, is based on matching lowresolution target image details to their high-resolution counterparts from...
In a good team, members do not only perform their individual task, they also coordinate their actions with other members of the team. Developing such team skills usually involves e...
Jurriaan van Diggelen, Tijmen Muller, Karel van de...