RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
We present a distance measure between audio files designed to identify cover songs, which are new renditions of previously recorded songs. For each song we compute the chromagram...
The power of the unaided, individual mind is highly overrated: The Renaissance scholar no longer exists. Although creative individuals are often thought of as working in isolation...
In a moving agent, the different apparent motion of objects located at various distances provides an important source of depth information. While motion parallax is evident for la...
— In wireless sensor networks, it is desirable to maintain good sensing coverage while keeping the number of active sensor nodes small to achieve long system lifetime. Existing c...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda