In this paper, we adopt the mathematical definition of perceptual quality recently proposed by Blau & Michaeli (2018), and use it to study the three-way tradeoff between rate, distortion, and perception. We show that restricting the perceptual quality to be high, generally leads to an ...
After a formal definition of the winding partition of then-torus, we provide a careful description of a series of unexpected behaviors of dissipative oscillator networks. This section culminates with a presentation of our rigorous mathematical results. We conclude by giving an example of two solution...
These contributions lead to the definition of a combinatorial optimisation problem, that is the Lossy Multistream Compression Problem, for which we provide an exact algorithm.doi:10.1016/j.tcs.2018.12.009Robin Lamarche-PerrinTheoretical Computer Science...
A new modified definition of Caputo-Fabrizio fractional-order derivative and their applications to the multi-step homotopy analysis method J Comput Appl Math, 346 (2019), pp. 247-260 View PDFView articleView in ScopusGoogle Scholar [54] M.D. Ortigueira Comments on “Modeling fractional stochasti...
Infrastructure as a Service (IaaS) is one of the provisioning models for Clouds as defined in the NIST Clouds definition. Although widely used, current IaaS implementations and solutions doesn't have common and well defined architecture ... Y Demchenko,CD Laat - 《Universiteit Van Amsterdam》 被...
@Simbosan replies to @radman8321:yet you can sit with your DAW and flick the switch to hear what you lose when you encode MP3 and it's NOT insignificant and you CAN hear it, therefore the difference is by definition, audible. Fact. The tests you refer to claim to make a complicated ...
In this paper, we propose a new cryptographic primitive called inner-product lossy trapdoor function (IPLTDF). We give a formal definition, and a concrete construction from lattices. We then show this primitive is useful to obtain efficient chosen-plaint
The generic definition of heterogeneity is a lack of uniformity. In terms of heterogeneous traffic load, some of the nodes are traffic-intensive while others generate traffic with a low traffic rate. In a normal scenario, the sensor nodes form a tree topology to transfer data towards the root...
We give a for- mal definition, and a concrete construction from lattices. We then show this primitive is useful to obtain efficient chosen-plaintext secure inner- product encryption (IPE) schemes. The resulting IPE scheme has almost the same public key size for multi-bit encryption compared ...
In a simulation-based definition of chosen-ciphertext selective opening security, we also handle non-adaptive adversaries by adapting the Naor-Yung paradigm and using the perfect zero-knowledge proofs of Groth, Ostrovsky and Sahai.doi:10.1007/978-3-642-25385-0_4B. Hemenway...