Abstract. Business-driven development favors the construction of process modifferent abstraction levels and by different people. As a consequence, there is a demand for consolidati...
Recently, application-level isolation was introduced as an effective means of containing the damage that a suspicious user could inflict on data. In most cases, only a subset of t...
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
A well known computationally efficient method for parameters estimation of linear frequency modulated (LFM) signals is to mix the received signals with a shifted version of itsel...
In multiuser detection, the set of users active at any time may be unknown to the receiver. A two-step detection procedure, in which multiuser detection is preceded by active-user...
Abstract. When developing statistical models of normal brain perfusion, two questions are of crucial interest: How well does an atlas describe normality and how sensitive is it at ...