... in which the
Slepian-Wolf coder takes the twofold role of compression
step and diffusion step for security.
The last two papers are in the field of secure entropy cod-
ing, and address the design ... on Information Security
problem of security in a distributed video coding frame-
work, where the correlation of adjacent frames is exploited
at the decoder, as opposed...
... articles,
with the latter becoming more and more scarce. There-
fore, the format of much of today’s news coverage sim-
ply doesn’t allow for detailed reporting.
Second, it can be difficult for scientists and ... relying on
them, and t he eve ning network news for the late st
media headlines to educate and guide them in their
medical decisions. Now more than ever, it is imp...
... all authors. SP and AA defined the research
theme. SP designed theorems and methods of proof and interpreted the results. AA proved the theorems, interpreted
the results and wrote the paper. All ... thank the referee for the insightful comments and suggestions. The first author would like
to thanks The Thailand Research Fund for financial support and the se...
... participated in the design of the study, carried
out part of the fieldwork, drafted and edited the manuscript. GD participated
in the study conception and design, and in drafting and editing the manu-
script. ... workforce. Capital invest-
ments were identified on the basis of information
obtained from the infrastructure department of the MoH.
They corresponded to t...
... relevant they are
for measurement of FA, whether they are appropriate,
and whether they are clear and well-formulated. Conse-
quently, two items were rephrased and seven items were
excluded for being ... questionnaire
module, the EORTC measurement system extends its
scopeintwodirections.OntheonehandtheFatigue
CAT w ill provide an improved measure for the generic
QLQ-C30 fatigu...
... The SSs
grouping model is shown in Figure 4.
The duration of the DL and the UL sub-frames are T
d
and
T
u
,respectively.T
ri
stands for the duration of the reservation
interval, and T
ud
is the ... , N. Similarly, R
i
stands
for the variable capacity assigned for SS i in a frame for the
uplink rtPS and ertPS transmissions together. The range of
the discre...
... link
layer informs the ELSN agent of the flow information and
sequence number of the retransmitted (discarded) packet.
Then, the ELSN agent constructs the ERSN (ELN) message
based on the information and ... received (n is typically
3), the sender sets the ssthresh and cwnd as the estimated
bandwidth. When a timeout occurs, the sender sets the
ssthresh as the estim...
... based on band energy ratio the low
energy ratio, defined as the ratio between the spectral energy
below 70 Hz and the total energy, and the high energy ratio,
defined as the ratio between the energy ... cost and a short delay.
The algorithm proposed here answers all these require-
ments: on one hand, it is highly accurate and robust, and on
the other hand, simple,...
... means that the best policy
for the source is to increase the value of m and to decrease
the value of μ.
On the other hand, with the knowledge of the values of λ
and μ, the relay calculates the expected ... sent
by the BS, the source finally calculates its utility according
to formula (2) and further adjusts the value of m and μ if
necessary. The interaction...
... that
workswellenoughinpractice.
The difference between the maximum energy cost
achieved by the algorithm and the optimum one lies how-
ever for sure between the maximum and minimum energy
cost achieved by the last adaptation. ... of the video content on the en-
ergy cost for the different approaches listed above. The PER
constraint is fixed to 1e-2 for the...