— This paper investigates the behavior of a Wireless Mesh Network in which the nodes are equipped with a multiple antenna system. The objective of this study is the comparison of...
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
City environments often lack textured areas, contain
repetitive structures, strong lighting changes and therefore
are very difficult for standard 3D modeling pipelines.
We prese...
This study attempted to accurately segment tumors in mammograms. Although this task is considered to be a preprocessing step in a computer analysis program, it plays an important ...
Lisa Kinnard, Shih-Chung Ben Lo, Paul C. Wang, Mat...
Physics-based simulation codes are widely used in science and engineering to model complex systems that would be infeasible to study otherwise. Such codes provide the highest-fid...