UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 85.902
1.
  • Graph-Based Compression of ... Graph-Based Compression of Dynamic 3D Point Cloud Sequences
    Thanou, Dorina; Chou, Philip A.; Frossard, Pascal IEEE Transactions on Image Processing, 04/2016, Letnik: 25, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    This paper addresses the problem of compression of 3D point cloud sequences that are characterized by moving 3D positions and color attributes. As temporally successive point cloud frames share some ...
Celotno besedilo

PDF
2.
  • Distributed Secret Sharing ... Distributed Secret Sharing Over a Public Channel From Correlated Random Variables
    Chou, Remi A. IEEE transactions on information theory, 04/2024, Letnik: 70, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    We consider a secret-sharing model where a dealer distributes the shares of a secret among a set of participants with the constraint that only predetermined subsets of participants must be able to ...
Celotno besedilo
3.
  • Trial of Endovascular Therapy for Acute Ischemic Stroke with Large Infarct
    Huo, Xiaochuan; Ma, Gaoting; Tong, Xu ... The New England journal of medicine, 04/2023, Letnik: 388, Številka: 14
    Journal Article
    Recenzirano

    The role of endovascular therapy for acute stroke with a large infarction has not been extensively studied in differing populations. We conducted a multicenter, prospective, open-label, randomized ...
Preverite dostopnost
4.
  • Compression of 3D Point Clo... Compression of 3D Point Clouds Using a Region-Adaptive Hierarchical Transform
    de Queiroz, Ricardo L.; Chou, Philip A. IEEE transactions on image processing, 08/2016, Letnik: 25, Številka: 8
    Journal Article
    Recenzirano

    In free-viewpoint video, there is a recent trend to represent scene objects as solids rather than using multiple depth maps. Point clouds have been used in computer graphics for a long time, and with ...
Celotno besedilo
5.
  • Polar Coding for Secret-Key... Polar Coding for Secret-Key Generation
    Chou, Remi A.; Bloch, Matthieu R.; Abbe, Emmanuel IEEE transactions on information theory, 2015-Nov., 2015-11-00, 20151101, Letnik: 61, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy ...
Celotno besedilo

PDF
6.
  • A Volumetric Approach to Po... A Volumetric Approach to Point Cloud Compression-Part I: Attribute Compression
    Chou, Philip A.; Koroteev, Maxim; Krivokuca, Maja IEEE transactions on image processing, 01/2020, Letnik: 29
    Journal Article
    Recenzirano

    Compression of point clouds has so far been confined to coding the positions of a discrete set of points in space and the attributes of those discrete points. We introduce an alternative approach ...
Celotno besedilo
7.
Celotno besedilo

PDF
8.
  • Separation of Reliability a... Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation
    Chou, Remi A.; Bloch, Matthieu R. IEEE transactions on information theory, 08/2014, Letnik: 60, Številka: 8
    Journal Article
    Recenzirano

    For a discrete or a continuous source model, we study the problem of secret-key generation with one round of rate-limited public communication between two legitimate users. Although we do not provide ...
Celotno besedilo

PDF
9.
  • Short Blocklength Wiretap C... Short Blocklength Wiretap Channel Codes via Deep Learning: Design and Performance Evaluation
    Rana, Vidhi; Chou, Remi A. IEEE transactions on communications, 03/2023, Letnik: 71, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    We design short blocklength codes for the Gaussian wiretap channel under information-theoretic security guarantees. Our approach consists in decoupling the reliability and secrecy constraints in our ...
Celotno besedilo
10.
  • Gaussian Multiuser Wiretap ... Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper
    Chou, Rémi A.; Yener, Aylin Entropy (Basel, Switzerland), 11/2022, Letnik: 24, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate ...
Celotno besedilo
1 2 3 4 5
zadetkov: 85.902

Nalaganje filtrov