In cellular systems, confidentiality of uplink transmission with respect to eavesdropping terminals can be ensured by creating intentional interference via scheduling of concurren...
As biometric authentication systems become more prevalent, it is becoming increasingly important to evaluate their performance. The current paper introduces a novel statistical me...
— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
—Recent developments in statistical theory and associated computational techniques have opened new avenues for image modeling as well as for image segmentation techniques. Thus, ...
—In this paper, based on ideas from lossy data coding and compression, we present a simple but effective technique for segmenting multivariate mixed data that are drawn from a mi...