Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
In a seminal paper, Lin and Reiter introduced a modeltheoretic definition for the progression of the initial knowledge base of a basic action theory. This definition comes with a ...
Abstract. We present decision procedures for logical constraints involving collections such as sets, multisets, and fuzzy sets. Element membership in our collections is given by ch...
Empirical evidence shows that in favorable situations semi-supervised learning (SSL) algorithms can capitalize on the abundance of unlabeled training data to improve the performan...
Towards photo-realistic 3D scene reconstruction from range and color images, we present a statistical technique for multimodal image registration. Statistical tools are employed t...