Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
A key element for video indexing and summarisation is the description of isolated events and actions. In the context of many sports the motion of the ball plays an essential role ...
Ibrahim Almajai, Josef Kittler, Teofilo de Campos,...
We consider a cognitive two-way relay network which consists of two transceivers (primary users) and multiple cognitive terminals. The two transceivers transmit their data toward t...
We present A-MAC, a receiver-initiated link layer for low-power wireless networks that supports several services under a unified architecture, and does so more efficiently and sca...
Prabal Dutta, Stephen Dawson-Haggerty, Yin Chen, C...