Skip to main content

Showing 1–6 of 6 results for author: Milosavljevic, N

.
  1. arXiv:2204.02776  [pdf, other

    cs.CV

    3D face reconstruction with dense landmarks

    Authors: Erroll Wood, Tadas Baltrusaitis, Charlie Hewitt, Matthew Johnson, **g**g Shen, Nikola Milosavljevic, Daniel Wilde, Stephan Garbin, Chirag Raman, Jamie Shotton, Toby Sharp, Ivan Stojiljkovic, Tom Cashman, Julien Valentin

    Abstract: Landmarks often play a key role in face analysis, but many aspects of identity or expression cannot be represented by sparse landmarks alone. Thus, in order to reconstruct faces more accurately, landmarks are often combined with additional signals like depth images or techniques like differentiable rendering. Can we keep things simple by just using more landmarks? In answer, we present the first m… ▽ More

    Submitted 20 July, 2022; v1 submitted 6 April, 2022; originally announced April 2022.

    Comments: ECCV 2022

  2. arXiv:1502.06149  [pdf, ps, other

    cs.IT

    Efficient Algorithms for the Data Exchange Problem

    Authors: Nebojsa Milosavljevic, Sameer Pawar, Salim El Rouayheb, Michael Gastpar, Kannan Ramchandran

    Abstract: In this paper we study the data exchange problem where a set of users is interested in gaining access to a common file, but where each has only partial knowledge about it as side-information. Assuming that the file is broken into packets, the side-information considered is in the form of linear combinations of the file packets. Given that the collective information of all the users is sufficient t… ▽ More

    Submitted 21 February, 2015; originally announced February 2015.

    Comments: submitted to Transactions on Information Theory

  3. arXiv:1203.2298  [pdf, ps, other

    cs.IT

    Minimum Cost Multicast with Decentralized Sources

    Authors: Nebojsa Milosavljevic, Sameer Pawar, Salim El Rouayheb, Michael Gastpar, Kannan Ramchandran

    Abstract: In this paper we study the multisource multicast problem where every sink in a given directed acyclic graph is a client and is interested in a common file. We consider the case where each node can have partial knowledge about the file as a side information. Assuming that nodes can communicate over the capacity constrained links of the graph, the goal is for each client to gain access to the file,… ▽ More

    Submitted 10 March, 2012; originally announced March 2012.

  4. arXiv:1202.1612  [pdf, ps, other

    cs.IT cs.CR

    Data Exchange Problem with Helpers

    Authors: Nebojsa Milosavljevic, Sameer Pawar, Salim El Rouayheb, Michael Gastpar, Kannan Ramchandran

    Abstract: In this paper we construct a deterministic polynomial time algorithm for the problem where a set of users is interested in gaining access to a common file, but where each has only partial knowledge of the file. We further assume the existence of another set of terminals in the system, called helpers, who are not interested in the common file, but who are willing to help the users. Given that the c… ▽ More

    Submitted 8 February, 2012; originally announced February 2012.

  5. arXiv:1108.6046  [pdf, ps, other

    cs.IT cs.CR

    Optimal Deterministic Polynomial-Time Data Exchange for Omniscience

    Authors: Nebojsa Milosavljevic, Sameer Pawar, Salim El Rouayheb, Michael Gastpar, Kannan Ramchandran

    Abstract: We study the problem of constructing a deterministic polynomial time algorithm that achieves omniscience, in a rate-optimal manner, among a set of users that are interested in a common file but each has only partial knowledge about it as side-information. Assuming that the collective information among all the users is sufficient to allow the reconstruction of the entire file, the goal is to minimi… ▽ More

    Submitted 30 August, 2011; originally announced August 2011.

  6. arXiv:1105.2621  [pdf, ps, other

    cs.IT

    A Compressed Sensing Wire-Tap Channel

    Authors: Galen Reeves, Naveen Goela, Nebojsa Milosavljevic, Michael Gastpar

    Abstract: A multiplicative Gaussian wire-tap channel inspired by compressed sensing is studied. Lower and upper bounds on the secrecy capacity are derived, and shown to be relatively tight in the large system limit for a large class of compressed sensing matrices. Surprisingly, it is shown that the secrecy capacity of this channel is nearly equal to the capacity without any secrecy constraint provided that… ▽ More

    Submitted 13 May, 2011; originally announced May 2011.