Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Databases and Information Systems (15)
- Artificial Intelligence and Robotics (14)
- Numerical Analysis and Scientific Computing (10)
- Systems Architecture (10)
- Mathematics (9)
-
- Engineering (8)
- Other Mathematics (8)
- Programming Languages and Compilers (8)
- Social and Behavioral Sciences (8)
- Arts and Humanities (7)
- Continental Philosophy (7)
- Environmental Sciences (7)
- Epistemology (7)
- Logic and Foundations (7)
- Logic and Foundations of Mathematics (7)
- Other Languages, Societies, and Cultures (7)
- Other Social and Behavioral Sciences (7)
- Philosophy (7)
- Philosophy of Mind (7)
- Philosophy of Science (7)
- Set Theory (7)
- Computer Engineering (4)
- Graphics and Human Computer Interfaces (4)
- Information Security (4)
- OS and Networks (4)
- Applied Mathematics (3)
- Business (3)
- Institution
-
- Selected Works (15)
- Singapore Management University (12)
- SelectedWorks (8)
- Air Force Institute of Technology (5)
- Technological University Dublin (4)
-
- Portland State University (3)
- University of Dayton (3)
- University of Nevada, Las Vegas (2)
- Ateneo de Manila University (1)
- Butler University (1)
- California Polytechnic State University, San Luis Obispo (1)
- California State University, San Bernardino (1)
- City University of New York (CUNY) (1)
- East Tennessee State University (1)
- Old Dominion University (1)
- University of Nebraska - Lincoln (1)
- University of Tennessee, Knoxville (1)
- University of Windsor (1)
- Western University (1)
- Keyword
-
- Algorithm (4)
- Genetic algorithms (4)
- Memristics, Memristors, Computation (4)
- Algorithms (3)
- Memristics (3)
-
- Morphogrammatics (3)
- Smooth numbers (3)
- Algorithm analysis (2)
- Artificial intelligence (2)
- Cellular automata (2)
- Chinese remainder theorem (2)
- Computational complexity (2)
- Deterministic chaos (2)
- Diffie-Hellman (2)
- Distance metric learning (2)
- EREW PRAM (2)
- Greatest common divisor (2)
- Hierarchical hypermedia (2)
- Information personalization (2)
- K-anonymity (2)
- Memristor (2)
- Modular exponentiation (2)
- Navigation (2)
- Out-of-turn interaction (2)
- Privacy (2)
- Rabin (2)
- Spatial Optimization (2)
- Website transformation (2)
- morphic bisimilarity. (1)
- Aggregation (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (12)
- Rudolf Kaehr (7)
- Jonathan P. Sorenson (6)
- Theses and Dissertations (5)
- Kyriakos MOURATIDIS (4)
-
- Computer Science Faculty Publications (3)
- Conference papers (3)
- Adrian Gepp (2)
- Computer Science Faculty Publications and Presentations (2)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (1)
- Ankur Gupta (1)
- Articles (1)
- CRRAR Publications (1)
- CSE Conference and Workshop Papers (1)
- Computer Science Theses & Dissertations (1)
- Department of Information Systems & Computer Science Faculty Publications (1)
- Doctoral Dissertations (1)
- Electronic Theses and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Gerardo Berbeglia (1)
- Javed A. Aslam (1)
- Master's Theses (1)
- Publications and Research (1)
- Scholarship and Professional Work - LAS (1)
- Systems Science Friday Noon Seminar Series (1)
- Theses Digitization Project (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
- Xiao-Jun Yang (1)
- Publication Type
- File Type
Articles 1 - 30 of 63
Full-Text Articles in Theory and Algorithms
K-Anonymity In The Presence Of External Databases, Dimitris Sacharidis, Kyriakos Mouratidis, Dimitris Papadias
K-Anonymity In The Presence Of External Databases, Dimitris Sacharidis, Kyriakos Mouratidis, Dimitris Papadias
Kyriakos MOURATIDIS
The concept of k-anonymity has received considerable attention due to the need of several organizations to release microdata without revealing the identity of individuals. Although all previous k-anonymity techniques assume the existence of a public database (PD) that can be used to breach privacy, none utilizes PD during the anonymization process. Specifically, existing generalization algorithms create anonymous tables using only the microdata table (MT) to be published, independently of the external knowledge available. This omission leads to high information loss. Motivated by this observation we first introduce the concept of k-join-anonymity (KJA), which permits more effective generalization to reduce the …
Aggregate Nearest Neighbor Queries In Spatial Databases, Dimitris Papadias, Yufei Tao, Kyriakos Mouratidis, Chun Kit Hui
Aggregate Nearest Neighbor Queries In Spatial Databases, Dimitris Papadias, Yufei Tao, Kyriakos Mouratidis, Chun Kit Hui
Kyriakos MOURATIDIS
Given two spatial datasets P (e.g., facilities) and Q (queries), an aggregate nearest neighbor (ANN) query retrieves the point(s) of P with the smallest aggregate distance(s) to points in Q. Assuming, for example, n users at locations q1,...qn, an ANN query outputs the facility p belongs to P that minimizes the sum of distances |pqi| for 1 is less than or equal to i is less than or equal to n that the users have to travel in order to meet there. Similarly, another ANN query may report the point p belongs to P that minimizes the maximum distance that …
Group Nearest Neighbor Queries, Dimitris Papadias, Qiongmao Shen, Yufei Tao, Kyriakos Mouratidis
Group Nearest Neighbor Queries, Dimitris Papadias, Qiongmao Shen, Yufei Tao, Kyriakos Mouratidis
Kyriakos MOURATIDIS
Given two sets of points P and Q, a group nearest neighbor (GNN) query retrieves the point(s) of P with the smallest sum of distances to all points in Q. Consider, for instance, three users at locations q1 , q2 and q3 that want to find a meeting point (e.g., a restaurant); the corresponding query returns the data point p that minimizes the sum of Euclidean distances |pqi| for 1 ≤i ≤3. Assuming that Q fits in memory and P is indexed by an R-tree, we propose several algorithms for finding the group nearest neighbors efficiently. As a second step, …
Constrained Shortest Path Computation, Manolis Terrovitis, Spiridon Bakiras, Dimitris Papadias, Kyriakos Mouratidis
Constrained Shortest Path Computation, Manolis Terrovitis, Spiridon Bakiras, Dimitris Papadias, Kyriakos Mouratidis
Kyriakos MOURATIDIS
This paper proposes and solves a-autonomy and k-stops shortest path problems in large spatial databases. Given a source s and a destination d, an aautonomy query retrieves a sequence of data points connecting s and d, such that the distance between any two consecutive points in the path is not greater than a. A k-stops query retrieves a sequence that contains exactly k intermediate data points. In both cases our aim is to compute the shortest path subject to these constraints. Assuming that the dataset is indexed by a data-partitioning method, the proposed techniques initially compute a sub-optimal path by …
Advanced Topics On State Complexity Of Combined Operations, Yuan Gao
Advanced Topics On State Complexity Of Combined Operations, Yuan Gao
Electronic Thesis and Dissertation Repository
State complexity is a fundamental topic in formal languages and automata theory. The study of state complexity is also strongly motivated by applications of finite automata in software engineering, programming languages, natural language and speech processing and other practical areas. Since many of these applications use automata of large sizes, it is important to know the number of states of the automata. In this thesis, we firstly discuss the state complexities of individual operations on regular languages, including union, intersection, star, catenation, reversal and so on. The state complexity of an operation on unary languages is usually different from that …
Random Automata Networks: Why Playing Dice Is Not A Vice, Christof Teuscher
Random Automata Networks: Why Playing Dice Is Not A Vice, Christof Teuscher
Systems Science Friday Noon Seminar Series
Random automata networks consist of a set of simple compute nodes interacting with each other. In this generic model, one or multiple model parameters, such as the the node interactions and/or the compute functions, are chosen at random. Random Boolean Networks (RBNs) are a particular case of discrete dynamical automata networks where both time and states are discrete. While traditional RBNs are generally credited to Stuart Kauffman (1969), who introduced them as simplified models of gene regulation, Alan Turing proposed unorganized machines as early as 1948. In this talk I will start with Alan Turing's early work on unorganized machines, …
Optimized Algorithms For Predictive Range And Knn Queries On Moving Objects, Rui Zhang, H.V. Jagadish, Bing Tian Dai, Kotagiri Ramamohanarao
Optimized Algorithms For Predictive Range And Knn Queries On Moving Objects, Rui Zhang, H.V. Jagadish, Bing Tian Dai, Kotagiri Ramamohanarao
Research Collection School Of Computing and Information Systems
There have been many studies on management of moving objects recently. Most of them try to optimize the performance of predictive window queries. However, not much attention is paid to two other important query types: the predictive range query and the predictive k nearest neighbor query. In this article, we focus on these two types of queries. The novelty of our work mainly lies in the introduction of the Transformed Minkowski Sum, which can be used to determine whether a moving bounding rectangle intersects a moving circular query region. This enables us to use the traditional tree traversal algorithms to …
Topical Summarization Of Web Videos By Visual-Text Time-Dependent Alignment, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo
Topical Summarization Of Web Videos By Visual-Text Time-Dependent Alignment, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
Search engines are used to return a long list of hundreds or even thousands of videos in response to a query topic. Efficient navigation of videos becomes difficult and users often need to painstakingly explore the search list for a gist of the search result. This paper addresses the challenge of topical summarization by providing a timeline-based visualization of videos through matching of heterogeneous sources. To overcome the so called sparse-text problem of web videos, auxiliary information from Google context is exploited. Google Trends is used to predict the milestone events of a topic. Meanwhile, the typical scenes of web …
Distributed Energy-Conserving Routing Protocols, Qun Li, Javed A. Aslam, Daniela Rus
Distributed Energy-Conserving Routing Protocols, Qun Li, Javed A. Aslam, Daniela Rus
Javed A. Aslam
This paper discusses several distributed power-aware routing protocols in wireless ad-hoc networks (especially sensor networks). We seek to optimize the lifetime of the network. We have developed three distributed power-aware algorithms and analyzed their efficiency in terms of the number of message broadcasts and the overall network lifetime modeled as the time to the first message that can not be sent. These are: (1) a distributed min Power algorithm (modeled on a distributed version of Dijkstra's algorithm), (2) a distributed max-min algorithm, and (3) the distributed version of our the centralized online max-min zPmin algorithm presented in [12]. The first …
Morphogrammatics Of Reflection, Rudolf Kaehr
Morphogrammatics Of Reflection, Rudolf Kaehr
Rudolf Kaehr
Turning back from the studies of morphogrammatics to some open questions of reflectional programming, the recountered problematics might be put into a different light and new methods of handling formal aspects of reflection and reflectionality shall be introduced. Albeit the use of light-metaphors, morphogrammatic reflection is not sketched along the paradigm of optical metaphors. Morphograms are presenting neither propositions nor perceptions able for mirroring (representation). Exercises in defining morphogrammatic retro-grade recursion and reflection schemata are continued from the paper “Sketches to Morphogrammatic Programming”.
Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan
Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan
Computer Science Faculty Publications
Personalization constitutes the mechanisms necessary to automatically customize information content, structure, and presentation to the end user to reduce information overload. Unlike traditional approaches to personalization, the central theme of our approach is to model a website as a program and conduct website transformation for personalization by program transformation (e.g., partial evaluation, program slicing). The goal of this paper is study personalization through a program transformation lens and develop a formal model, based on program transformations, for personalized interaction with hierarchical hypermedia. The specific research issues addressed involve identifying and developing program representations and transformations suitable for classes of hierarchical …
A Hoare Calculus For Graph Programs, Christopher M. Poskitt, Detlef Plump
A Hoare Calculus For Graph Programs, Christopher M. Poskitt, Detlef Plump
Research Collection School Of Computing and Information Systems
We present Hoare-style axiom schemata and inference rules for verifying the partial correctness of programs in the graph programming language GP. The pre- and postconditions of this calculus are the nested conditions of Habel, Pennemann and Rensink, extended with expressions for labels in order to deal with GP’s conditional rule schemata and infinite label alphabet. We show that the proof rules are sound with respect to GP’s operational semantics.
The Maximum Clique Problem: Algorithms, Applications, And Implementations, John David Eblen
The Maximum Clique Problem: Algorithms, Applications, And Implementations, John David Eblen
Doctoral Dissertations
Computationally hard problems are routinely encountered during the course of solving practical problems. This is commonly dealt with by settling for less than optimal solutions, through the use of heuristics or approximation algorithms. This dissertation examines the alternate possibility of solving such problems exactly, through a detailed study of one particular problem, the maximum clique problem. It discusses algorithms, implementations, and the application of maximum clique results to real-world problems. First, the theoretical roots of the algorithmic method employed are discussed. Then a practical approach is described, which separates out important algorithmic decisions so that the algorithm can be easily …
On Decision Support For Deliberating With Constraints In Constrained Optimization Models, Steven O. Kimbrough, Ann Kuo, Hoong Chuin Lau, David H. Wood
On Decision Support For Deliberating With Constraints In Constrained Optimization Models, Steven O. Kimbrough, Ann Kuo, Hoong Chuin Lau, David H. Wood
Research Collection School Of Computing and Information Systems
This paper introduces the Deliberation Decision Support System (DDSS). The DDSS obtains heuristically (using a genetic algorithm) solutions of interest for constrained optimization models. This is illustrated, without loss of generality, by generalized assignment problems. The DDSS also provides users with graphical tools that support post-solution deliberation for constrained optimization models. The DDSS and this paper, as befits practical concerns, are focused on deliberation with respect to the constraints of the models being used.
Hoare Logic For Graph Programs, Christopher M. Poskitt, Detlef Plump
Hoare Logic For Graph Programs, Christopher M. Poskitt, Detlef Plump
Research Collection School Of Computing and Information Systems
We present a new approach for verifying programs written in GP (for Graph Programs), an experimental programming language for performing computations on graphs at a high level of abstraction. Taking a labelled graph as input, a graph program nondeterministically applies to it a number of graph transformation rules, directed by simple control constructs such as sequential composition and as-long-as-possible iteration. We adapt classical Hoare logic to the domain of graphs, and describe a system of sound proof rules for showing the partial correctness of graph programs.
Cloud Storage And Online Bin Packing, Swathi Venigella
Cloud Storage And Online Bin Packing, Swathi Venigella
UNLV Theses, Dissertations, Professional Papers, and Capstones
Cloud storage is the service provided by some corporations (such as Mozy and Carbonite) to store and backup computer files. We study the problem of allocating memory of servers in a data center based on online requests for storage. Over-the-net data backup has become increasingly easy and cheap due to cloud storage. Given an online sequence of storage requests and a cost associated with serving the request by allocating space on a certain server one seeks to select the minimum number of servers as to minimize total cost. We use two different algorithms and propose a third algorithm; we show …
Semi-Supervised Distance Metric Learning For Collaborative Image Retrieval And Clustering, Steven C. H. Hoi, Wei Liu, Shih-Fu Chang
Semi-Supervised Distance Metric Learning For Collaborative Image Retrieval And Clustering, Steven C. H. Hoi, Wei Liu, Shih-Fu Chang
Research Collection School Of Computing and Information Systems
Learning a good distance metric plays a vital role in many multimedia retrieval and data mining tasks. For example, a typical content-based image retrieval (CBIR) system often relies on an effective distance metric to measure similarity between any two images. Conventional CBIR systems simply adopting Euclidean distance metric often fail to return satisfactory results mainly due to the well-known semantic gap challenge. In this article, we present a novel framework of Semi-Supervised Distance Metric Learning for learning effective distance metrics by exploring the historical relevance feedback log data of a CBIR system and utilizing unlabeled data when log data are …
Merging Schemas In A Collaborative Faceted Classification System, Jianxiang Li
Merging Schemas In A Collaborative Faceted Classification System, Jianxiang Li
Computer Science Theses & Dissertations
We have developed a system that improves access to a large, growing image collection by allowing users to collaboratively build a global faceted (multi-perspective) classification schema. We are extending our system to support both global and local schemas, where global schema provides a complete and uniform view of the collection whereas local schema provides a personal, possibly incomplete and idiosyncratic view of the collection. We argue that although users usually focus on their personal schemas, it is still desirable to have a global schema for the entire collection even if such local schemas are available. In order to keep the …
A Review Of Procedures To Evolve Quantum Algorithms, Adrian Gepp, Phil Stocks
A Review Of Procedures To Evolve Quantum Algorithms, Adrian Gepp, Phil Stocks
Adrian Gepp
There exist quantum algorithms that are more efficient than their classical counterparts; such algorithms were invented by Shor in 1994 and then Grover in 1996. A lack of invention since Grover’s algorithm has been commonly attributed to the non-intuitive nature of quantum algorithms to the classically trained person. Thus, the idea of using computers to automatically generate quantum algorithms based on an evolutionary model emerged. A limitation of this approach is that quantum computers do not yet exist and quantum simulation on a classical machine has an exponential order overhead. Nevertheless, early research into evolving quantum algorithms has shown promise. …
Business Failure Prediction Using Survival Analysis, Kuldeep Kumar, Adrian Gepp
Business Failure Prediction Using Survival Analysis, Kuldeep Kumar, Adrian Gepp
Adrian Gepp
Accurate business failure prediction models would be extremely valuable to many industry sectors, particularly in financial investment and lending. Recently, there has been a significant increase in interest in business failure prediction, from both industry and academia. Statistical business failure prediction models attempt to predict the failure or success of a business. Discriminant and logit analyses have been the most popular approaches, but there are also a large number of alternative techniques available. In this paper, a comparatively new technique known as survival analysis has been used for business failure prediction. Overall, the results suggest that survival analysis techniques provide …
A First Practical Algorithm For High Levels Of Relational Consistency, Shant Karakashian, Robert J. Woodward, Christopher Reesons, Berthe Y. Choueiry, Christian Bessiere
A First Practical Algorithm For High Levels Of Relational Consistency, Shant Karakashian, Robert J. Woodward, Christopher Reesons, Berthe Y. Choueiry, Christian Bessiere
CSE Conference and Workshop Papers
Consistency properties and algorithms for achieving them are at the heart of the success of Constraint Programming. In this paper, we study the relational consistency property R(∗,m)C, which is equivalent to m-wise consistency proposed in relational databases. We also define wR(∗,m)C, a weaker variant of this property. We propose an algorithm for enforcing these properties on a Constraint Satisfaction Problem by tightening the existing relations and without introducing new ones. We empirically show that wR(∗,m)C solves in a backtrack-free manner all the instances of some CSP benchmark classes, thus hinting at the tractability of those classes.
An Application Of Automated Theorem Provers To Computer System Security: The Schematic Protection Model, Mitchell D.I. Hirschfeld
An Application Of Automated Theorem Provers To Computer System Security: The Schematic Protection Model, Mitchell D.I. Hirschfeld
Theses and Dissertations
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology File System schemes are proven. Arbitrary systems can be specified in SPM and analyzed. This is the first known automated analysis of SPM specifications in a theorem prover. The SPM specification was created in such a way that new specifications share the underlying framework and are configurable within the specifications file alone. This allows new specifications to be created with ease as demonstrated by the four unique models included within this document. This also allows future users to more easily specify models without recreating the …
Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge
Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge
Conference papers
A principal weakness of all encryption systems is that the output data can be `seen' to be encrypted. In other words, encrypted data provides a 'flag' on the potential value of the information that has been encrypted. In this paper, we provide a novel approach to `hiding' encrypted data in a digital image. We consider an approach in which a plaintext image is encrypted with a cipher using the processes of `stochastic diffusion' and the output quantized into a 1-bit array generating a binary image cipher-text. This output is then `embedded' in a host image which is undertaken either in …
Generating Compact Wasp Nest Structures Via Minimal Complexity Algorithms., Fadel Ewusi Kofi Adoe
Generating Compact Wasp Nest Structures Via Minimal Complexity Algorithms., Fadel Ewusi Kofi Adoe
Electronic Theses and Dissertations
Many models have been developed to explain the process of self organization-the emergence of seemingly purposeful behaviors from groups of entities with limited individual intelligence. However, the underlying behavior that facilitates the emergence of this global pattern is not generally well understood. Our study focuses on different low complexity building algorithms and characterizes how nests are built using these algorithms. Three rules postulated to be functions of wasps' building behavior were developed. First is the random rule, in which there is no constraint per the choice of site to be initiated. The second is the 2-cell rule where only sites …
Open Innovation In Platform Competition, Mei Lin
Open Innovation In Platform Competition, Mei Lin
Research Collection School Of Computing and Information Systems
We examine the competition between a proprietary platform and an open platform,where each platform holds a two-sided market consisted of app developers and users.The open platform cultivates an innovative environment by inviting public efforts todevelop the platform itself and permitting distribution of apps outside of its own appmarket; the proprietary platform restricts apps sales solely within its app market. Weuse a game theoretic model to capture this competitive phenomenon and analyze theimpact of growth of the open source community on the platform competition. We foundthat growth of the open community mitigates the platform rivalry, and balances the developernetwork sizes on …
Personalization By Website Transformation: Theory And Practice, Saverio Perugini
Personalization By Website Transformation: Theory And Practice, Saverio Perugini
Computer Science Faculty Publications
We present an analysis of a progressive series of out-of-turn transformations on a hierarchical website to personalize a user’s interaction with the site. We formalize the transformation in graph-theoretic terms and describe a toolkit we built that enumerates all of the traversals enabled by every possible complete series of these transformations in any site and computes a variety of metrics while simulating each traversal therein to qualify the relationship between a site’s structure and the cumulative effect of support for the transformation in a site. We employed this toolkit in two websites. The results indicate that the transformation enables users …
Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr
Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr
Rudolf Kaehr
The idea behind this patchwork of conceptual interventions is to show the possibility of a “buffer-free” modeling of the crossbar architecture for memristive systems on the base of a purely difference-theoretical approach. It is considered that on a nano-electronic level principles of interpretation appears as mechanisms of complementarity. The most basic conceptual approach to such a complementarity is introduced as an interchangeability of operators and operands of an operation. Therefore, the architecture of crossbars gets an interpretation as complementarity between crossbar functionality and “buffering” translation functionality. That is, the same matter functions as operator and at once, as operand – …
Memristics: Memristors, Again?, Rudolf Kaehr
Memristics: Memristors, Again?, Rudolf Kaehr
Rudolf Kaehr
This collection gives first and short critical reflections on the concepts of memristics, memristors and memristive systems and the history of similar movements with an own focus on a possible interplay between memory and computing functions, at once, at the same place and time, to achieve a new kind of complementarity between computation and memory on a single chip without retarding buffering conditions.
Finding Influentials Based On The Temporal Order Of Information Adoption In Twitter, Changhyun Lee, Haewoon Kwak, Hosung Park, Sue Moon
Finding Influentials Based On The Temporal Order Of Information Adoption In Twitter, Changhyun Lee, Haewoon Kwak, Hosung Park, Sue Moon
Research Collection School Of Computing and Information Systems
Twitter offers an explicit mechanism to facilitate information diffusion and has emerged as a new medium for communication. Many approaches to find influentials have been proposed, but they do not consider the temporal order of information adoption. In this work, we propose a novel method to find influentials by considering both the link structure and the temporal order of information adoption in Twitter. Our method finds distinct influentials who are not discovered by other methods.
Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady
Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady
Theses and Dissertations
Radar systems provide an important remote sensing capability, and are crucial to the layered sensing vision; a concept of operation that aims to apply the right number of the right types of sensors, in the right places, at the right times for superior battle space situational awareness. The layered sensing vision poses a range of technical challenges, including radar, that are yet to be addressed. To address the radar-specific design challenges, the research community responded with waveform diversity; a relatively new field of study which aims reduce the cost of remote sensing while improving performance. Early work suggests that the …