—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
Three-dimensional (3D) visual scenes with pluralities of graphic objects require considerable network bandwidth to be transmitted and computing power to be rendered on a user'...
This paper presents an e cient recursive algorithm for generating operationally optimal intra mode scalable layer decompositions of object contours. The problem is posed in terms ...
Abstract— A cross-layer optimization combining retransmission diversity with multi-user diversity is investigated for wireless communications. To this end, a joint design of adap...
Xin Wang, Di Wang, Irena Li, Hanqi Zhuang, Salvato...
Video applications on mobile handheld devices are very challenging mainly due to the complex computational needs of video decoding and the limited capacity of batteries of handhel...