We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
In a fundamental paradigm shift in system design, entire systems are being built on a single chip, using multiple embedded cores. Though the newest system design methodology has s...
Automated line detection is a classical image processing topic with many applications such as road detection in remote images and vessel detection in medical images. Many traditio...
Qin Li, Lei Zhang, Jane You, David Zhang, Prabir B...
In distributed video coding (DVC), the video statistics are exploited, partially or totally at the decoder. A particular case of DVC, WynerZiv video coding deals with lossy source...
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...