The steganographic security in the Cachin’s work is defined as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
Robust model fitting plays an important role in many computer vision applications. In this paper, we propose a new robust estimator — Maximum Kernel Density Estimator (MKDE) bas...
We present a decomposition strategy to speed up constraint optimization for a representative multiprocessor scheduling problem. In the manner of Benders decomposition, our techniq...
Abstract—SIGMA is an IP diversity-based mobility management scheme that aims to reduce handoff latency and packet loss of Mobile IP. In this paper, we propose a power-aware versi...
abstract Manor Mendel1 and Assaf Naor2 1 The Open University of Israel 2 Courant Institute Let (X, dX ) be an n-point metric space. We show that there exists a distribution D over ...