We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Background: With the explosion in data generated using microarray technology by different investigators working on similar experiments, it is of interest to combine results across...
Hyungwon Choi, Ronglai Shen, Arul M. Chinnaiyan, D...
Two algorithms based upon a tree-cotree decomposition, called in this paper spanning tree technique (STT) and generalized spanning tree technique (GSTT), have been shown to be usef...
We propose a new approach for detecting low textured
planar objects and estimating their 3D pose. Standard
matching and pose estimation techniques often depend on
texture and fe...
Stefan Holzer, Stefan Hinterstoisser, Slobodan Ili...
Abstract. The Aviation Safety Reporting System (ASRS) is used to collect voluntarily submitted aviation safety reports from pilots, controllers and others. As such it is particular...