The concept of weak stability boundary has been successfully used in the design of several fuel efficient space missions. In this paper we give a rigorous definition of the weak st...
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
In the recent decades most of the big organizations have adopted maturity driven process improvement efforts (MDPI). Most of these efforts have been inspired of maturity models li...
In this paper, a novel nested cascade detector for multi-view face detection is presented. This nested cascade is learned by Schapire and Singer's improved boosting algorithm...
In most of the proposed clustering algorithms for wireless ad hoc networks, the cluster-heads form a dominating set in the network topology. A variant of dominating set which is mo...