Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
This paper presents a beat tracking system that processes acoustic signals of music and recognizes temporal positions of beats in real time. Musical beat tracking is needed by var...
Many of today's complex computer applications are being modeled and constructed using the principles inherent to real-time distributed object systems. In response to this dem...
Images taken with wide-angle cameras tend to have severe distortions which pull points towards the optical center: This paper proposes a method for recovering the disrortion param...