Abstract— Practical log-domain filter circuits might have multiple operating points in regions in which the translinear element does not obey the exponential law. In this paper,...
Shyam Subramanian, David V. Anderson, Paul E. Hasl...
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Abstract. As an ongoing effort to develop a computer aided system for the detection of masses on mammograms, we propose on this work a new model-based segmentation algorithm. The a...
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Abstract. The infrastructure for mobile distributed tasks is often formed by cellular networks. One of the major issues in such networks is interference. In this paper we tackle in...
Fabian Kuhn, Pascal von Rickenbach, Roger Wattenho...