Models of computation like Kahn and dataflow process networks provide convenient means for modeling signal processing applicahis is partly due to the abstract primitives that thes...
Paul Lieverse, Pieter van der Wolf, Ed F. Deprette...
This paper determines packet level performance measures of a MAC protocol for a wireless ATM local area network. A key characteristic of the MAC protocol is the Identi er Splittin...
Benny Van Houdt, Chris Blondia, Olga Casals, Jorge...
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Web data extraction is concerned, among other things, with routine data accessing and downloading from continuously-updated dynamic Web pages. There is a relevant trade-off between...
This paper addresses recognition of human activities with stochastic structure, characterized by variable spacetime arrangements of primitive actions, and conducted by a variable ...