Cryptographic Boolean functions must be complex to satisfy Shannon's principle of confusion. But the cryptographic viewpoint on complexity is not the same as in circuit compl...
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been repo...
We propose an automatic monitoring system which detects and tracks intruders, using a pan-tiltzoom camera. Detection is based on a background subtraction method which detects the ...
We analyze a model of irreversible investment with two sources of uncertainty. A riskneutral decision maker has the choice between two mutually exclusive projects under input pric...
Two sets are non-crossing if they are disjoint or one contains the other. The noncrossing graph NCn is the graph whose vertex set is the set of nonempty subsets of [n] = {1, . . ....