2.5G and 3G cellular networks are becoming more and more widespread. Therefore, the need for value added services is increasing rapidly. One of the key services that operators see...
We study the capacity of secret-key agreement over a wiretap channel with state parameters. The transmitter communicates to the legitimate receiver and the eavesdropper over a disc...
Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornel...
Exploiting spatial locality is critical for a disk scheduler to achieve high throughput. Because of the high cost of disk head seeks and the non-preemptible nature of request serv...
In current interframe video compression systems, the encoder performs predictive coding to exploit the similarities of successive frames. The Wyner-Ziv Theorem on source coding wi...
It is a challenging problem to design an e cient MPEG-4 video delivery system that can maximize the perceptual quality while achieving high resource utilization. This paper addres...
Yiwei Thomas Hou, Dapeng Wu, Wenwu Zhu, Hung-Ju Le...