In this paper we present a video communication system that integrates end-to-end buffer management and congestion control at the source with the playout adjustment mechanism at th...
Ivan V. Bajic, Omesh Tickoo, Anand Balan, Shivkuma...
Abstract In this paper, we compare two spatial multiplexing MIMO-OFDM downlink transmission schemes based on limited feedback: I. Per-chunk user scheduling; II. Zero-forcing receiv...
Finite failure NHPP models proposed in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault, and are inadequate ...
Like many natural phenomenon, clouds are often modeled using procedural methods, which may be difficult for an artist to control. In this paper, a freehand sketching system is prop...
Marc Stiver, Andrew Baker, Adam Runions, Faramarz ...
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...