For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Brightfield microscopy often suffers from limited depth of field, which prevents thick specimens from being imaged entirely in-focus. By optically sectioning the specimen, the inf...
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Gaussian filtering in one, two or three dimensions is among the most commonly needed tasks in signal and image processing. Finite impulse response filters in the time domain with ...
This paper presents a method to represent two-person interactions at a semantic level with a natural language description. A human interaction is composed of two singleperson acti...