Abstract. In recent years the problem of object recognition has received considerable attention from both the machine learning and computer vision communities. The key challenge of...
This paper presents how text -mining techniques can be used to analyze an enterprise’s external environment searching for competitors, related products and services, marketing st...
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
With the rapid growth of emerging demand and deployment of wireless LAN (WLAN), much of traffic including multimedia traffic is forced to travel over WLAN. Since the legacy IEEE 80...
Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Kyunghun...