In many multimedia applications, there is a need to authenticate a source that has been subjected to benign degradations in addition to potential tampering attacks. We develop a m...
We consider the role of topological dimension in problems of network consensus and vehicular formations where only local feedback is available. In particular, we consider the simpl...
Bassam Bamieh, Mihailo R. Jovanovic, Partha P. Mit...
—Pull-based mesh streaming protocols have recently received much research attention, with successful commercial systems showing their viability in the Internet. Despite the remar...
In image denoising, many researchers have tried for several years to combine wavelet-like approaches and optimization methods (typically based on the total variation minimization)...
We address the image denoising problem, where zeromean white and homogeneous Gaussian additive noise should be removed from a given image. The approach taken is based on sparse an...