With the growing popularity of mobile smart devices, the existing networks are unable to meet the requirement of many complex scenarios; current network architectures and protocol...
This paper aims to compare between four different types of feature extraction approaches in terms of texture segmentation. The feature extraction methods that were used for segment...
Abstract—This paper presents the case for Data Plane Timestamping (DPT). We argue that in the unique environment of Software-Defined Networks (SDN), attaching a timestamp to the...
Abstract— As our ground transportation infrastructure modernizes, the large amount of data being measured, transmitted, and stored motivates an analysis of the privacy aspect of ...
Roy Dong, Walid Krichene, Alexandre M. Bayen, S. S...
Motivated by clinical trials, we study bandits with observable noncompliance. At each step, the learner chooses an arm, after, instead of observing only the reward, it also observ...
We study the semantic foundation of expressive probabilistic programming languages, that support higher-order functions, continuous distributions, and soft constraints (such as An...
Sam Staton, Hongseok Yang, Chris Heunen, Ohad Kamm...
We propose a novel camera pose estimation or perspectiven-point (PnP) algorithm, based on the idea of consistency regions and half-space intersections. Our algorithm has linear ti...
Alireza Ghasemi, Adam Scholefield, Martin Vetterli
– Human face aging is irreversible process causing changes in human face characteristics such us hair whitening, muscles drop and wrinkles. Due to the importance of human face ag...
Salah Eddine Bekhouche, Abdelkrim Ouafi, Abdelmali...
Why has SIFT been so successful? Why its extension, DSP-SIFT, can further improve SIFT? Is there a theory that can explain both? How can such theory benefit real applications? Ca...