Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research...
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
Many complex control problems require sophisticated solutions that are not amenable to traditional controller design. Not only is it difficult to model real world systems, but oft...
Parallel software for solving the quadratic program arising in training support vector machines for classification problems is introduced. The software implements an iterative dec...
Herein we present a quantitative noise analysis of diffraction enhanced imaging (DEI), an x-ray imaging method that produces absorption and refraction images, with inherent immuni...
Miles N. Wernick, Jovan G. Brankov, Alejandro Saiz...