Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
In this paper, we study the number of measurements required to recover a sparse signal in M with L nonzero coefficients from compressed samples in the presence of noise. We conside...
Cooperation between wireless nodes to retransmit data for the other users introduces multiuser diversity to a wireless network and increases the system throughput. In this paper, t...
Based on the local keypoints extracted as salient image patches, an image can be described as a "bag-of-visualwords (BoW)" and this representation has appeared promising ...
Yu-Gang Jiang, Jun Yang 0003, Chong-Wah Ngo, Alexa...
Abstract--Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about h...