abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
In this paper, we study the fundamental performance limits of image denoising where the aim is to recover the original image from its noisy observation. Our study is based on a ge...
In this paper we describe the theory and practice of self-calibration of cameras which are fixed in location and may freely rotate while changing their internal parameters by zoomi...
Systems that track sensed data trigger alerts based on the evaluation of some condition. In the presence of loss data a conservative condition may not generate a necessary alert an...
This article presents doctoral research on tool integration within software engineering environments. Tool integration concerns the techniques used to form coalitions of tools tha...