Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
A novel approach to the detection of genomic repeats is presented in this paper. The technique, dubbed SAGRI (Spectrum Assisted Genomic Repeat Identifier), is based on the spectru...
Huy Hoang Do, Kwok Pui Choi, Franco P. Preparata, ...
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Image quality loss resulting from artifacts depends on the nature and strength of the artifacts as well as the context or background in which they occur. In order to include the im...
Nathir A. Rawashdeh, Shaun T. Love, Kevin D. Donoh...
This paper studies the design of signaling waveforms for time-hopping impulse radio (TH-IR) with limits on the power spectral density. Such restrictions are imposed by the spectra...