Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
Abstract. Objective image and video quality measures play important roles in numerous image and video processing applications. In this work, we propose a new content-weighted metho...
The mainstream approach to image quality assessment has centered around accurately modeling the single most relevant strategy employed by the human visual system (HVS) when judging...
Leading classification methods such as support vector machines (SVMs) and their counterparts achieve strong generalization performance by maximizing the margin of separation betw...
Abstract. This paper focuses in the analysis of 100% static and distributed inter-cell interference coordination techniques in the context of LTE networks. Several methods have bee...