—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
This paper presents Anonymouth, a novel framework for anonymizing writing style. Without accounting for style, anonymous authors risk identification. This framework is necessary t...
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan...
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-He...
Using discrete Hidden-Markov-Models (HMMs) for recognition requires the quantization of the continuous feature vectors. In handwritten whiteboard note recognition it turns out tha...
: Spiking neural P systems are computing models inspired from the way the neurons communicate by means of spikes, electrical impulses of identical shapes. In this note we consider ...