Abstract— In a slot-synchronized wireless communication system, a set of signature sequences can be derived by circularly shifting a base sequence with good auto correlation prop...
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Although graphs are very common in computer science, they are still very difficult to handle for proof assistants as proving properties of graphs may require heavy computations. T...
We describe a method for registering and superresolving moving vehicles from aerial surveillance video. The challenge of vehicle super-resolution lies in the fact that vehicles ma...
Abstract— Long distance Wi-Fi links are cost effective alternative to provide internet and VoIP connectivity, in rural areas. In developing regions these low cost solutions have ...