Multiview image registration is to compute the globally consistent transformations of a sequence of images. Due to various uncertainties, multiview image registration is considere...
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Abstract— The paper deals with decentralized Bayesian detection with M hypotheses, and N sensors making conditionally correlated measurements regarding these hypotheses. Each sen...
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
We analyze the problem of preventing outgoing spam. We show that some conventional techniques for limiting outgoing spam are likely to be ineffective. We show that while imposing...