As cryptographic proofs have become essentially unverifiable, cryptographers have argued in favor of developing techniques that help tame the complexity of their proofs. Game-base...
Several recent studies have investigated the problem of object feature extraction with artificial whiskers. Many of these studies have used an approach in which the whisker is rot...
Background: Recent genomic scale survey of epigenetic states in the mammalian genomes has shown that promoters and enhancers are correlated with distinct chromatin signatures, pro...
Kyoung-Jae Won, Iouri Chepelev, Bing Ren, Wei Wang
Copyright 2005 IEEE. Published in the 2005 International Conference on Advanced Video and Signal-based Surveillance (AVSS-2005), September 15-16, 2005, Como, Italy. Personal use o...
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...