—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
The central problem in computational mechanism design is the tension between incentive compatibility and computational ef ciency. We establish the rst significant approximability ...
Christos H. Papadimitriou, Michael Schapira, Yaron...
— This paper investigates minimizing mutual interferences in wireless ad hoc networks by means of topology control. Prior work defines interference as a relationship between link...
To improve the accuracy of tissue structural and architectural characterization with diffusion tensor imaging, an anisotropic smoothing algorithm is presented for reducing noise i...
Qing Xu 0003, Adam W. Anderson, John C. Gore, Zhao...
— The correct segmentation and measurement of mammography images is of fundamental importance for the development of automatic or computer-aided cancer detection systems. In this...
Aida A. Ferreira, Francisco Nascimento Jr., Ing Re...