Browse Dissertations and Theses - Electrical and Computer Engineering by Contributor "Moulin, Pierre"

  • Johnstone, Patrick Royce (2017-04-07)
    Optimization is an important discipline of applied mathematics with far-reaching applications. Optimization algorithms often form the backbone of practical systems in machine learning, image processing, signal processing, ...

    application/pdf

    application/pdfPDF (1MB)
  • Ezzeddine, Ibtissam M. (2010-05-18)
    This work studies stegocodes (data-hiding codes) for covert communication over timing channels. In a timing channel, the information resides in the packet interdeparture times as opposed to the packets themselves. The ...

    application/pdf

    application/pdfPDF (527kB)
  • Huang, Yen-Wei (2014-01-16)
    This dissertation studies the asymptotics of two multi-user channel problems. The fingerprinting channel is associated with digital fingerprinting, which is an emerging technology to protect multimedia from unauthorized ...

    application/pdf

    application/pdfPDF (955kB)
  • Li, Yanjun (2018-06-15)
    Bilinear inverse problems (BIPs), the resolution of two vectors given their image under a bilinear mapping, arise in many applications. Without further constraints, BIPs are usually ill-posed. In practice, parsimonious ...

    application/pdf

    application/pdfPDF (3MB)
  • Gao, Xiaobin (2018-08-23)
    Communication scheduling and remote estimation scenarios arise in the context of wireless sensor networks, which involve monitoring and controlling the state of a dynamical system from remote locations. This entails joint ...

    application/pdf

    application/pdfPDF (809kB)
  • Banerjee, Taposh (2015-01-21)
    In the classical problem of quickest change detection, a decision maker observes a sequence of random variables. At some point of time, the distribution of the random variables changes abruptly. The objective is to detect ...

    application/pdf

    application/pdfPDF (2MB)
  • Houmansadr, Amir (2012-09-18)
    Linking network flows is an important problem in several security-related applications including intrusion detection and anonymity. The flows of interest in these applications are commonly relayed by several low-latency ...

    application/pdf

    application/pdfPDF (2MB)
  • Ligo, Jonathan Gillmore (2017-09-22)
    In this thesis, we study the sparse mixture detection problem as a binary hypothesis testing problem. Under the null hypothesis, we observe i.i.d. samples from a known noise distribution. Under the alternative hypothesis, ...

    application/pdf

    application/pdfPDF (1MB)
  • Wang, Ying (2006)
    Then, from an information-theoretic perspective, we derive the capacity and random-coding error exponent of perfectly secure steganography and public fingerprinting. For both games, a randomized stacked-binning scheme and ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Muralidhar, Anand (2011-08-25)
    This dissertation addresses the problem of determining the capacity of wireless networks and how to operate them. Within this context we present results on Gaussian relay, interference, and multicast networks. Two ...

    application/pdf

    application/pdfPDF (1MB)
  • Chen, Scott D. (2011-05-25)
    This thesis explores multimodal document classification algorithms in a unified framework. Classification algorithms are designed to exploit both text and image information, which proliferates in modern documents. We design ...

    application/pdf

    application/pdfPDF (983kB)
  • Targino Da Costa, Andre Luiz Nunes (2015-04-22)
    The evolution of electronic computers seems to have now reached the ubiquitous realm of wearable computing. Although a vast gamut of systems has been proposed so far, we believe most systems lack proper feedback for the ...

    application/pdf

    application/pdfPDF (40MB)
  • Gigaud, Guillaume (2010-08-20)
    Traitor-tracing (aka fingerprinting) has received much attention as a possible solution for protecting media copyrights. However, current schemes for image and video fingerprinting lack robustness against geometric attacks. ...

    application/pdf

    application/pdfPDF (1MB)
  • Nguyen, Kien C. (2011-08-25)
    Together with the massive and rapid evolution of computer networks, there has been a surge of research interest and activity surrounding network security recently. A secure network has to provide users with confidentiality, ...

    application/pdf

    application/pdfPDF (3MB)
  • Sadasivam, Shankar (2011-05-25)
    In this thesis, we look closely at two fundamental problems that arise within the context of multimedia blind watermark decoding and timing channels steganalysis. The central problem considered, loosely speaking, is that ...

    application/pdf

    application/pdfPDF (1MB)
  • Zhuang, Furen (2019-04-09)
    In this thesis we explore methods which learn compact hash coding schemes to encode image databases such that relevant images can be quickly retrieved when a query image is presented. We here present three contributions. ...

    application/pdf

    application/pdfPDF (483kB)
  • Johnstone, Patrick (2014-09-16)
    This thesis is concerned with a class of methods known collectively as iterative thresholding algorithms. These methods have been used by researchers for several decades to solve various optimization problems that arise ...

    application/pdf

    application/pdfPDF (456kB)
  • Mihcak, Mehmet Kivanc (2002)
    Finally, we present a new approach to the watermarking problem that is based on traditional cryptographic arguments. Here, the attacker is assumed to have enough information about the algorithmic steps of information hiding ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Seo, Daewon (2019-06-05)
    Many recent information technologies such as crowdsourcing and social decision-making systems are designed based on (near-)optimal information processing techniques for machines. However, in such applications, some parts ...

    application/pdf

    application/pdfPDF (1MB)
  • El Gamal, Ali (2014-05-30)
    Coordinated Multi-Point (CoMP) transmission is an infrastructural enhancement under consideration for next generation wireless networks. In this work, the capacity gain achieved through CoMP transmission is studied in ...

    application/pdf

    application/pdfPDF (1MB)