— To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs int...
GMM based algorithms have become the de facto standard for background subtraction in video sequences, mainly because of their ability to track multiple background distributions, w...
Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
In genome rearrangements, the double cut and join (DCJ) operation, introduced by Yancopoulos et al., allows to represent most rearrangement events that could happen in multichromos...
This paper focuses on perturbation-based distributed beamforming with 1-bit feedback for wireless amplify-and-forward relay networks. We propose to use multiplicative perturbation...