Thispaper presents an information-theoreticstudy ofvideo codecs that are based on the principle of source coding with side information at the decoder In contrast to the classical ...
Prakash Ishwar, Vinod M. Prabhakaran, Kannan Ramch...
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
—There has been significant recent interest in covert communication using timing channels. In network timing channels, information is leaked by controlling the time between tran...
Sarah H. Sellke, Chih-Chun Wang, Saurabh Bagchi, N...
Abstract. Many heuristic estimators for classical planning are based on the socalled delete relaxation, which ignores negative effects of planning operators. Ideally, such heuristi...
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...