The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
A K-user memoryless interference channel is considered where each receiver sequentially decodes the data of a subset of transmitters before it decodes the data of the designated t...
Mohammad Ali Maddah-Ali, Hajar Mahdavi-Doost, Amir...
State-of-the-art pattern recognition methods have difficulty dealing with problems where the dimension of the output space is large. In this article, we propose a new framework ba...
In this paper is presented an effective and efficient method for content-aware image resizing. It is based on the solution of a linear system where each pixel displacement (compres...
We develop a realistic model for multiple-input multiple-output (MIMO) broadcast channels, where each randomly located user's average SNR depends on its distance from the tran...