In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Model updating is a critical problem in tracking. Inaccurate extraction of the foreground and background information in model adaptation would cause the model to drift and degrade ...
Obtaining high quality images in MR is desirable not only for accurate visual assessment but also for automatic processing to extract clinically relevant parameters. Filtering-bas...
Ganesh Adluru, Tolga Tasdizen, Ross Whitaker, Edwa...
Abstract—The distributed nature and large scale of MapReduce programs and systems poses two challenges in using existing profiling and debugging tools to understand MapReduce pr...