Missing data techniques have been recently applied to speaker recognition to increase performance in noisy environments. The drawback of these techniques is the vulnerability of t...
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Abstract—This paper presents a new task assignment algorithm that integrates area search and target tracking. A new tracking metric is derived that encodes the ability of each ro...
Abstract—Understanding user behavior in wireless environments is useful for a variety of reasons ranging from the design of better sleep algorithms for components of mobile devic...
—In this paper we describe the fabrication and characterization of a multiplexed biosensor based on molecular bio-wires that can be used for detecting multiple pathogens in a bio...
Yang Liu, Shantanu Chakrabartty, Evangelyn C. Aloc...