We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Background: Recently, microarray data analyses using functional pathway information, e.g., gene set enrichment analysis (GSEA) and significance analysis of function and expression...
Rongheng Lin, Shuangshuang Dai, Richard D. Irwin, ...
This paper presents an efficient method to reduce complexities of a linear network in s-domain. The new method works on circuit matrices directly and reduces the circuit complexi...
An integrated modeling and robust model predictive control (MPC) approach is proposed for a class of nonlinear systems with unknown steady state. First, the nonlinear system is id...
Hui Peng, Zi-Jiang Yang, Weihua Gui, Min Wu, Hideo...
A cognitive radio (CR) network is often described as a secondary network operating in a frequency band originally licensed/allocated to a primary network consisting of one or multi...