— We consider 1-helper problem in which one source provides partial side information to the fusion center (FC) to help reconstruction of the main source signal. Both sources comm...
Current outlier detection schemes typically output a numeric score representing the degree to which a given observation is an outlier. We argue that converting the scores into wel...
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
—In this paper, we analyze the achievable capacity of the secondary service for overlay and underlay access strategies. We then propose a novel mixed access strategy in which in ...
Mohammad G. Khoshkholgh, Keivan Navaie, Halim Yani...
This paper proposes a distributed Canny edge detection algorithm which can be mapped onto multi-core architectures for high throughput applications. In contrast to the conventiona...