Milos Stojmenovic

Learn More
We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt(More)
It is often useful to measure how linear a certain set of points is. Our goal is to design algorithms that give a linearity measurement in the interval [0, 1]. There is no explicit discussion on linearity in literature, although some existing shape measures may be adapted. We are interested in linearity measures which are invariant to rotation, scaling, and(More)
In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review(More)
Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and(More)
As a typical emerging application of cyber physical system, smart power grid is composed of interdependent power grid and communication/control networks. The latter one contains relay nodes for communication and operation centers to control power grid. Failure in one network might cause failures in the other. In addition, these failures may occur(More)
The recent availability of small, inexpensive low power GPS receivers and techniques for finding relative coordinates based on signal strengths, and the need for the design of power efficient and scalable networks, provided justification for applying position based routing methods in ad hoc networks. A number of such algorithms were developed recently. They(More)
Our primary interest is to build fast and reliable object recognizers in images based on small training sets. This is important in cases where the training set needs to be built mostly manually, as in the case that we studied, the recognition of the Honda Accord 2004 from rear views. We describe a novel variant of the AdaBoost based learning algorithm,(More)
Our primary interest is to build fast and reliable object recognizers in images based on small training sets. This is important in cases where the training set needs to be built mostly manually, as in the case that we studied, the recognition of the Honda Accord 2004 from rear views. Our experiments indicated that the set of features used by Viola and(More)
The computation of a shape’s orientation is a common task in the area of computer vision and image processing, being used for example to define a local frame of reference and is helpful for recognition and registration, robot manipulation, etc. It is usually an initial step or a part of data preprocessing in many image processing and computer vision tasks.(More)
Shape elongation is one of the basic shape descriptors that has a very clear intuitive meaning. That is the reason for its applicability in many shape classification tasks. In this paper we define a new method for computing shape elongation. The new measure is boundary based and uses all the boundary points. We start with shapes having polygonal boundaries.(More)