Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
—This paper focuses on the use of specific interleaving techniques for use in W-CDMA (Wideband Code Division Multiple Access). The linear equalization algorithm usually performs ...
Along with the widespread deployment of the third generation cellular networks, the fast-improving capabilities of the mobile devices, content and service providers are increasing...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
The recognition of emotional information is a key step toward giving computers the ability to interact more naturally and intelligently with people. This paper presents a completel...
Eva Cerezo, Isabelle Hupont, Cristina Manresa-Yee,...
Motivated by the challenging task of designing “secure” vote storage mechanisms, we study information storage mechanisms that operate in extremely hostile environments. In suc...