Our attention is focused on designing an optimal procurement mechanism which a buyer can use for procuring multiple units of a homogeneous item based on bids submitted by autonomou...
N. Hemachandra, Raghav Kumar Gautam, V. Hastagiri ...
The Fisher Linear Discriminant (FLD) is commonly used in pattern recognition. It finds a linear subspace that maximally separates class patterns according to Fisher's Criteri...
In this paper, we propose a Joint Source-Network error control coding (JSNC) scheme which efficiently integrates scalable video coding, error control coding and overlay infrastruc...
Yufeng Shan, Shivkumar Kalyanaraman, John W. Woods...
Perceptual image hashing maps an image to a fixed length binary string based on the image's appearance to the human eye, and has applications in image indexing, authenticatio...
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...