Abstract--Research on congestion-control algorithms has traditionally focused more on performance than on robustness of the closed-loop system to changes in network conditions. As ...
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
This paper extends our recent game-theoretic approach [1] to design and embed watermarks in Gaussian signals in the presence of an adversary. The detector solves a binary hypothes...
A simple protocol for latency-insensitive design is presented. The main features of the protocol are the efficient implementation of elastic communication channels and the automat...
Jordi Cortadella, Michael Kishinevsky, Bill Grundm...
We address the problem of binary image operator design over large windows by breaking it into two phases. Firstly, we design several operators over small sub-windows of the main w...
Carlos S. Santos, Nina S. T. Hirata, Roberto Hirat...