—This paper exploits the use of location information of wireless terminals to improve the performance of a beamforming system and support multiple access. Based on a system provi...
Congzheng Han, Matthew Webb, Angela Doufexi, Mark ...
—Cellular networks operating with a frequency reuse factor of one are often interference-limited. For that reason, base station (BS) cooperation techniques aiming at mitigating t...
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
We demonstrate a multiscale pedestrian detector operating in near real time (5 fps on 640x480 images) with state-of-the-art detection performance. The computational bottleneck of ...
The Active Appearance Model (AAM) provides an efficient method for localizing objects that vary in both shape and texture, and uses a linear regressor to predict updates to model ...
Philip A. Tresadern, Patrick Sauer, Timothy F. Coo...