We examine the problem of determining a user's value for his/her private information. Web businesses often offer rewards, such as discounts, free downloads and website persona...
Scott Buffett, Nathan Scott, Bruce Spencer, Michae...
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
2D Active Appearance Models (AAM) and 3D Morphable
Models (3DMM) are widely used techniques. AAM
provide a fast fitting process, but may represent unwanted
3D transformations un...
Background: Several diseases, many of which nowadays pandemic, consist of multifactorial pathologies. Paradigmatic examples come from the immune response to pathogens, in which ca...
Anil Sorathiya, Andrea Bracciali, Pietro Liò...
In this paper, we address the problem of color image restoration. Here, we model the image as a Markov Random Field (MRF) and propose a restoration algorithm in a multiresolution ...
P. K. Nanda, K. Sunil Kumar, S. Ghokale, Uday B. D...