We provide a simple protocol for secret reconstruction in any threshold secret sharing scheme, and prove that it is fair when executed with many rational parties together with a s...
Shien Jin Ong, David C. Parkes, Alon Rosen, Salil ...
A novel approach to the automatic classiJcation of remote sensed images is proposed. This approach is based on a three-phase procedure: first pixels which belong to the areas of i...
Giovanni Gallo, Giorgio Grasso, Salvatore Nicotra,...
We address the problem of performance and power-efficient thread allocation in a CMP. To that end, based on analytical model, we introduce a parameterized performance/power metric ...
Power is considered to be the major limiter to the design of more faster and complex processors in the near future. In order to address this challenge, a combination of process, c...
David Duarte, Narayanan Vijaykrishnan, Mary Jane I...
— We study Bayesian detection based cognitive sensing and analyze its impact on the capacity in various cases of location information. In a network of one primary and one cogniti...