The World Wide Web can be considered as a large distributed information system that provides access to shared data objects. As one of the most popular applications currently runni...
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
We consider the Wyner-Ziv (WZ) problem of lossy compression where the decompressor observes a noisy version of the source, whose statistics are unknown. A new family of WZ coding a...
Using a networked infrastructure of easily available sensors and context-processing components, we are developing applications for the support of workplace interactions. Notions o...
Simple Integrated Media Access (SIMA) is a differentiated service scheme based on drop preference bits in every packet. The basic idea of the SIMA is to maximize the exploitation ...