Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
The problem of synthesizing multivariate stationary series Y [n] = (Y1[n], . . . , YP [n])T , n ∈ Z, with prescribed non-Gaussian marginal distributions, and a targeted covarian...
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
—Motion information is an important cue for a robot to separate foreground moving objects from the static background world. Based on the observation that the motion of the backgr...
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...