Search
Now showing items 381-390 of 507
Fast total variation minimizing image restoration under mixed Poisson-Gaussian noise
Image acquisition in many biomedical imaging modalities is corrupted by Poisson noise followed by
additive Gaussian noise. Maximum Likelihood Estimation (MLE) based restoration methods that use
the exact Likelihood ...
Constant-rate Non-malleable Codes and their Applications
Non-malleable codes(NMC) introduced by Dziembowski, Pietrzak and Wichs in ITCS 2010,
provide powerful security guarantees where error-correcting codes can not provide any guarantee: a decoding of tampered codeword is ...
FA RCU: Fault Aware Read-Copy-Update
Deferred freeing is the fundamental technique used in Read-Copy-Update (RCU) synchronization technique where reclamation of resources is deferred until the completion of all active RCU read-side critical sections. We observe ...
Towards Secure and Efficient Realization of Pairing-Based Signatures from Static Assumptions.
Bilinear pairing defined over elliptic curve group was first used to design novel cryptosystem in 2000. Since then a large number of cryptosystems has been proposed in pairing-based cryptography (PBC). The main tool for ...
Total Electric Field due to an Electron Avalanche and it's coupling to Transmission Line Conductors
Transmission of bulk electric power from the generating stations to the load centres can be carried out only through high voltages transmission lines. One of the main issues in the design and maintenance of extra and ...
Visual Speech Recognition
Visual speech recognition (VSR), or automatic lip-reading, is the task of extracting speech
information from visual input. The addition of visual speech has been shown to improve
the performance of traditional audio ...
Multiview Registration Using Rank-Constrained Semide nite Programming
We consider the problem of reconstructing a 3D surface from its multiview scans. Typically, the
computational pipeline for this problem has two phases: (I) finding point-to-point correspondences
between overlapping scans, ...
Efficient and Secure Search over Encrypted Data
Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The
outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy.
However, if the ...
Mask Estimator Approaches For Audio Beamforming
Beamforming is a family of algorithms and performs a spatial filtering operation that makes it possible to map the distribution of the sources at a certain distance from the microphones and therefore locate the ...
Precoding and Channel Estimation Schemes for MIMO VLC Systems
Increase in the usage of smartphones and growing demand for data have resulted in
congestion in the RF spectrum. To ease the overcrowding of RF spectrum, there is a
need for wireless communication systems that can ...

