Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
The shared data space model has proven to be an effective paradigm for building distributed applications. However, building an efficient distributed implementation remains a chall...
Giovanni Russello, Michel R. V. Chaudron, Maarten ...
The analysis and characterization of atrial tachyarrhythmias requires the previous estimation of the atrial activity (AA) free from any ventricular activity and other artefacts. Th...
Francisco Castells, Jorge Igual, Vicente Zarzoso, ...
Abstract. To enable an online virtual university, a learning environment covering the entire spectrum of the learning and management process is required. However, constructing such...
Recently, there are active discussions on the possibility of non-invertible watermarking scheme. A non-invertible scheme prevents an attacker from deriving a valid watermark from a...