Abstract--Many shared-memory parallel systems use lockbased synchronization mechanisms to provide mutual exclusion or reader-writer access to memory locations. Software locks are i...
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Many low-level vision algorithms assume a prior probability over images, and there has been great interest in trying to learn this prior from examples. Since images are very non G...
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...
The ongoing convergence between TV and the Internet leads traditional broadcast companies to publish their content on the Internet. Interactive digital TV platforms, which support...
Steven Van Assche, Filip Hendrickx, Nico Oorts, Lo...