A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
Given k sorted arrays, the t-Threshold problem, which is motivated by indexed search engines, consists of finding the elements which are present in at least t of the arrays. We pr...
In this paper, a new systematic method to segment possible target areas based on wavelet transforms is presented. We develop an analytic model for the segmentation of targets, whi...
Abstract--Removing noise from audio signals requires a nondiagonal processing of time-frequency coefficients to avoid producing "musical noise." State of the art algorith...