Skip to main content

Showing 1–33 of 33 results for author: McLaughlin, S

Searching in archive cs. Search in all archives.
.
  1. A Bayesian Based Deep Unrolling Algorithm for Single-Photon Lidar Systems

    Authors: Jakeoung Koo, Abderrahim Halimi, Stephen McLaughlin

    Abstract: Deploying 3D single-photon Lidar imaging in real world applications faces multiple challenges including imaging in high noise environments. Several algorithms have been proposed to address these issues based on statistical or learning-based frameworks. Statistical methods provide rich information about the inferred parameters but are limited by the assumed model correlation structures, while deep… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  2. Real-time, low-cost multi-person 3D pose estimation

    Authors: Alice Ruget, Max Tyler, Germán Mora Martín, Stirling Scholes, Feng Zhu, Istvan Gyongy, Brent Hearn, Steve McLaughlin, Abderrahim Halimi, Jonathan Leach

    Abstract: The process of tracking human anatomy in computer vision is referred to pose estimation, and it is used in fields ranging from gaming to surveillance. Three-dimensional pose estimation traditionally requires advanced equipment, such as multiple linked intensity cameras or high-resolution time-of-flight cameras to produce depth images. However, there are applications, e.g.~consumer electronics, whe… ▽ More

    Submitted 24 August, 2022; v1 submitted 11 October, 2021; originally announced October 2021.

  3. Fast Scalable Image Restoration using Total Variation Priors and Expectation Propagation

    Authors: Dan Yao, Stephen McLaughlin, Yoann Altmann

    Abstract: This paper presents a scalable approximate Bayesian method for image restoration using total variation (TV) priors. In contrast to most optimization methods based on maximum a posteriori estimation, we use the expectation propagation (EP) framework to approximate minimum mean squared error (MMSE) estimators and marginal (pixel-wise) variances, without resorting to Monte Carlo sampling. For the cla… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

    Comments: 14 pages

  4. arXiv:2106.15327  [pdf, other

    cs.CV stat.ME

    Patch-Based Image Restoration using Expectation Propagation

    Authors: Dan Yao, Stephen McLaughlin, Yoann Altmann

    Abstract: This paper presents a new Expectation Propagation (EP) framework for image restoration using patch-based prior distributions. While Monte Carlo techniques are classically used to sample from intractable posterior distributions, they can suffer from scalability issues in high-dimensional inference problems such as image restoration. To address this issue, EP is used here to approximate the posterio… ▽ More

    Submitted 10 November, 2021; v1 submitted 18 June, 2021; originally announced June 2021.

    Comments: 27 pages

  5. arXiv:2106.13367  [pdf, other

    cs.AI cs.DB

    SeaNet -- Towards A Knowledge Graph Based Autonomic Management of Software Defined Networks

    Authors: Qianru Zhou, Alasdair J. G. Gray, Stephen McLaughlin

    Abstract: Automatic network management driven by Artificial Intelligent technologies has been heatedly discussed over decades. However, current reports mainly focus on theoretic proposals and architecture designs, works on practical implementations on real-life networks are yet to appear. This paper proposes our effort toward the implementation of knowledge graph driven approach for autonomic network manage… ▽ More

    Submitted 27 May, 2022; v1 submitted 24 June, 2021; originally announced June 2021.

  6. arXiv:2011.11444  [pdf, other

    eess.IV cs.CV

    Robust super-resolution depth imaging via a multi-feature fusion deep network

    Authors: Alice Ruget, Stephen McLaughlin, Robert K. Henderson, Istvan Gyongy, Abderrahim Halimi, Jonathan Leach

    Abstract: Three-dimensional imaging plays an important role in imaging applications where it is necessary to record depth. The number of applications that use depth imaging is increasing rapidly, and examples include self-driving autonomous vehicles and auto-focus assist on smartphone cameras. Light detection and ranging (LIDAR) via single-photon sensitive detector (SPAD) arrays is an emerging technology th… ▽ More

    Submitted 1 February, 2021; v1 submitted 20 November, 2020; originally announced November 2020.

  7. SARA -- A Semantic Access Point Resource Allocation Service for Heterogenous Wireless Networks

    Authors: Qianru Zhou, Alasdair J. G. Gray, Dimitrios Pezaros, Stephen McLaughlin

    Abstract: In this paper, we present SARA, a Semantic Access point Resource Allocation service for heterogenous wireless networks with various wireless access technologies existing together. By automatically reasoning on the knowledge base of the full system provided by a knowledge based autonomic network management system -- SEANET, SARA selects the access point providing the best quality of service among t… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: 2019 IEEE Wireless Day

  8. Robust 3D reconstruction of dynamic scenes from single-photon lidar using Beta-divergences

    Authors: Quentin Legros, Julian Tachella, Rachael Tobin, Aongus McCarthy, Sylvain Meignen, Gerald S. Buller, Yoann Altmann, Stephen McLaughlin, Michael E. Davies

    Abstract: In this paper, we present a new algorithm for fast, online 3D reconstruction of dynamic scenes using times of arrival of photons recorded by single-photon detector arrays. One of the main challenges in 3D imaging using single-photon lidar in practical applications is the presence of strong ambient illumination which corrupts the data and can jeopardize the detection of peaks/surface in the signals… ▽ More

    Submitted 18 December, 2020; v1 submitted 20 April, 2020; originally announced April 2020.

    Comments: 12 pages

  9. arXiv:2002.07118  [pdf, other

    eess.IV cs.CV physics.optics

    Seeing Around Corners with Edge-Resolved Transient Imaging

    Authors: Joshua Rapp, Charles Saunders, Julián Tachella, John Murray-Bruce, Yoann Altmann, Jean-Yves Tourneret, Stephen McLaughlin, Robin M. A. Dawson, Franco N. C. Wong, Vivek K Goyal

    Abstract: Non-line-of-sight (NLOS) imaging is a rapidly growing field seeking to form images of objects outside the field of view, with potential applications in search and rescue, reconnaissance, and even medical imaging. The critical challenge of NLOS imaging is that diffuse reflections scatter light in all directions, resulting in weak signals and a loss of directional information. To address this proble… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

    Comments: Includes manuscript (14 pages) and supplement (24 pages)

  10. arXiv:1903.05372  [pdf, other

    cs.CY cs.NI

    Lost Silence: An emergency response early detection service through continuous processing of telecommunication data streams

    Authors: Qianru Zhou, Stephen McLaughlin, Alasdair J. G. Gray, Shangbin Wu, Chengxiang Wang

    Abstract: Early detection of significant traumatic events, e.g. a terrorist attack or a ship capsizing, is important to ensure that a prompt emergency response can occur. In the modern world telecommunication systems could play a key role in ensuring a successful emergency response by detecting such incidents through significant changes in calls and access to the networks. In this paper a methodology is ill… ▽ More

    Submitted 13 March, 2019; originally announced March 2019.

    Comments: 15 pages, 4 figures, WSP ISWC 2017 conference

    Journal ref: ISWC WSP 2017, pp. 33--47

  11. arXiv:1810.12043  [pdf, other

    cs.CV

    Patch-Based Sparse Representation For Bacterial Detection

    Authors: Ahmed Karam Eldaly, Yoann Altmann, Ahsan Akram, Antonios Perperidis, Kevin Dhaliwal, Stephen McLaughlin

    Abstract: In this paper, we propose an unsupervised approach for bacterial detection in optical endomicroscopy images. This approach splits each image into a set of overlap** patches and assumes that observed intensities are linear combinations of the actual intensity values associated with background image structures, corrupted by additive Gaussian noise and potentially by a sparse outlier term modelling… ▽ More

    Submitted 24 January, 2019; v1 submitted 29 October, 2018; originally announced October 2018.

  12. Image computing for fibre-bundle endomicroscopy: A review

    Authors: Antonios Perperidis, Kevin Dhaliwal, Stephen McLaughlin, Tom Vercauteren

    Abstract: Endomicroscopy is an emerging imaging modality, that facilitates the acquisition of in vivo, in situ optical biopsies, assisting diagnostic and potentially therapeutic interventions. While there is a diverse and constantly expanding range of commercial and experimental optical biopsy platforms available, fibre-bundle endomicroscopy is currently the most widely used platform and is approved for cli… ▽ More

    Submitted 3 September, 2018; originally announced September 2018.

    Comments: 38 Pages, 2 Figures, 6 Tables

  13. Deconvolution and Restoration of Optical Endomicroscopy Images

    Authors: Ahmed Karam Eldaly, Yoann Altmann, Antonios Perperidis, Nikola Krstajic, Tushar Choudhary, Kevin Dhaliwal, Stephen McLaughlin

    Abstract: Optical endomicroscopy (OEM) is an emerging technology platform with preclinical and clinical imaging applications. Pulmonary OEM via fibre bundles has the potential to provide in vivo, in situ molecular signatures of disease such as infection and inflammation. However, enhancing the quality of data acquired by this technique for better visualization and subsequent analysis remains a challenging p… ▽ More

    Submitted 28 August, 2018; v1 submitted 27 January, 2017; originally announced January 2017.

  14. A Survey of Stochastic Simulation and Optimization Methods in Signal Processing

    Authors: Marcelo Pereyra, Philip Schniter, Emilie Chouzenoux, Jean-Christophe Pesquet, Jean-Yves Tourneret, Alfred Hero, Steve McLaughlin

    Abstract: Modern signal processing (SP) methods rely very heavily on probability and statistics to solve challenging SP problems. SP methods are now expected to deal with ever more complex models, requiring ever more sophisticated computational inference techniques. This has driven the development of statistical SP methods based on stochastic simulation and optimization. Stochastic simulation and optimizati… ▽ More

    Submitted 20 November, 2015; v1 submitted 1 May, 2015; originally announced May 2015.

    Comments: To appear in the IEEE Journal of Selected Topics in Signal Processing special issue on Stochastic Simulation and Optimisation in Signal Processing, March 2016

  15. arXiv:1502.01400  [pdf, other

    stat.CO cs.CV

    Fast unsupervised Bayesian image segmentation with adaptive spatial regularisation

    Authors: Marcelo Pereyra, Steve McLaughlin

    Abstract: This paper presents a new Bayesian estimation technique for hidden Potts-Markov random fields with unknown regularisation parameters, with application to fast unsupervised K-class image segmentation. The technique is derived by first removing the regularisation parameter from the Bayesian model by marginalisation, followed by a small-variance-asymptotic (SVA) analysis in which the spatial regulari… ▽ More

    Submitted 2 February, 2016; v1 submitted 4 February, 2015; originally announced February 2015.

  16. arXiv:1501.02155  [pdf, ps, other

    math.MG cs.LO

    A formal proof of the Kepler conjecture

    Authors: Thomas Hales, Mark Adams, Gertrud Bauer, Dat Tat Dang, John Harrison, Truong Le Hoang, Cezary Kaliszyk, Victor Magron, Sean McLaughlin, Thang Tat Nguyen, Truong Quang Nguyen, Tobias Nipkow, Steven Obua, Joseph Pleso, Jason Rute, Alexey Solovyev, An Hoai Thi Ta, Trung Nam Tran, Diep Thi Trieu, Josef Urban, Ky Khac Vu, Roland Zumkeller

    Abstract: This article describes a formal proof of the Kepler conjecture on dense sphere packings in a combination of the HOL Light and Isabelle proof assistants. This paper constitutes the official published account of the now completed Flyspeck project.

    Submitted 9 January, 2015; originally announced January 2015.

    Comments: 21 pages

  17. arXiv:1410.4871  [pdf, other

    physics.data-an cs.CV stat.ME

    Bayesian estimation of the multifractality parameter for image texture using a Whittle approximation

    Authors: Sébastien Combrexelle, Herwig Wendt, Nicolas Dobigeon, Jean-Yves Tourneret, Steve McLaughlin, Patrice Abry

    Abstract: Texture characterization is a central element in many image processing applications. Multifractal analysis is a useful signal and image processing tool, yet, the accurate estimation of multifractal parameters for image texture remains a challenge. This is due in the main to the fact that current estimation procedures consist of performing linear regressions across frequency scales of the two-dimen… ▽ More

    Submitted 9 April, 2015; v1 submitted 17 October, 2014; originally announced October 2014.

    Journal ref: IEEE T. Image Proces., vol. 24, no. 8, pp. 2540-2551, Aug. 2015

  18. arXiv:1112.0665  [pdf, ps, other

    cs.IT

    Generalized Thresholding and Online Sparsity-Aware Learning in a Union of Subspaces

    Authors: Konstantinos Slavakis, Yannis Kopsinis, Sergios Theodoridis, Stephen McLaughlin

    Abstract: This paper studies a sparse signal recovery task in time-varying (time-adaptive) environments. The contribution of the paper to sparsity-aware online learning is threefold; first, a Generalized Thresholding (GT) operator, which relates to both convex and non-convex penalty functions, is introduced. This operator embodies, in a unified way, the majority of well-known thresholding rules which promot… ▽ More

    Submitted 29 November, 2012; v1 submitted 3 December, 2011; originally announced December 2011.

  19. Physical-Layer Security over Correlated Erasure Channels

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker has with respect to the sent ciphertext. Prior work focused on cases in which the wiretap channel could be modeled as statistically independent p… ▽ More

    Submitted 17 February, 2011; originally announced February 2011.

    Comments: 5 pages, 4 figures, submitted to ISIT 2011

  20. Coding for Cryptographic Security Enhancement using Stop** Sets

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the diff… ▽ More

    Submitted 15 February, 2011; originally announced February 2011.

    Comments: 13 pages, 8 figures

  21. Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes

    Authors: Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven W. McLaughlin

    Abstract: For an arbitrary degree distribution pair (DDP), we construct a sequence of low-density parity-check (LDPC) code ensembles with girth growing logarithmically in block-length using Ramanujan graphs. When the DDP has minimum left degree at least three, we show using density evolution analysis that the expected bit-error probability of these ensembles, when passed through a binary erasure channel wit… ▽ More

    Submitted 22 February, 2011; v1 submitted 16 September, 2010; originally announced September 2010.

    Comments: 11 pages, 4 figures. Submitted to the IEEE Transactions on Information Forensics and Security

  22. Strong Secrecy for Erasure Wiretap Channels

    Authors: Ananda T. Suresh, Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven McLaughlin

    Abstract: We show that duals of certain low-density parity-check (LDPC) codes, when used in a standard coset coding scheme, provide strong secrecy over the binary erasure wiretap channel (BEWC). This result hinges on a stop** set analysis of ensembles of LDPC codes with block length $n$ and girth $\geq 2k$, for some $k \geq 2$. We show that if the minimum left degree of the ensemble is $l_\mathrm{min}$, t… ▽ More

    Submitted 30 April, 2010; originally announced April 2010.

    Comments: Submitted to the Information Theory Workship (ITW) 2010, Dublin

  23. Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both… ▽ More

    Submitted 4 May, 2009; originally announced May 2009.

    Comments: 11 pages, 5 figures, accepted at 2009 IEEE International Symposium on Information Theory (ISIT 2009)

  24. arXiv:0902.3286  [pdf, ps, other

    cs.IT

    MDS codes on the erasure-erasure wiretap channel

    Authors: Arunkumar Subramanian, Steven W. McLaughlin

    Abstract: This paper considers the problem of perfectly secure communication on a modified version of Wyner's wiretap channel II where both the main and wiretapper's channels have some erasures. A secret message is to be encoded into $n$ channel symbols and transmitted. The main channel is such that the legitimate receiver receives the transmitted codeword with exactly $n - ν$ erasures, where the position… ▽ More

    Submitted 18 February, 2009; originally announced February 2009.

    Comments: Submitted to the 2009 IEEE International Symposium on Information Theory

  25. Physical-Layer Security: Combining Error Control Coding and Cryptography

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: In this paper we consider tandem error control coding and cryptography in the setting of the {\em wiretap channel} due to Wyner. In a typical communications system a cryptographic application is run at a layer above the physical layer and assumes the channel is error free. However, in any real application the channels for friendly users and passive eavesdroppers are not error free and Wyner's wi… ▽ More

    Submitted 16 April, 2009; v1 submitted 2 January, 2009; originally announced January 2009.

    Comments: 12 pages, 5 figures. Submitted and accepted to the International Conference on Communications (ICC) 2009. v2: equivalent to the version that will be published in the conference proceedings. Has some altered notation from version 1 as well as slight changes in the wording to make the paper more readable and easier to understand

    ACM Class: H.1.1; K.6.5

  26. The Design of Efficiently-Encodable Rate-Compatible LDPC Codes

    Authors: Jaehong Kim, Aditya Ramamoorthy, Steven W. McLaughlin

    Abstract: We present a new class of irregular low-density parity-check (LDPC) codes for moderate block lengths (up to a few thousand bits) that are well-suited for rate-compatible puncturing. The proposed codes show good performance under puncturing over a wide range of rates and are suitable for usage in incremental redundancy hybrid-automatic repeat request (ARQ) systems. In addition, these codes are li… ▽ More

    Submitted 3 May, 2007; originally announced May 2007.

    Comments: Accepted subject to minor revision to IEEE Trans. on Comm

  27. arXiv:cs/0611121  [pdf, ps, other

    cs.IT

    Wireless Information-Theoretic Security - Part II: Practical Implementation

    Authors: Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin

    Abstract: In Part I of this two-part paper on confidential communication over wireless channels, we studied the fundamental security limits of quasi-static fading channels from the point of view of outage secrecy capacity with perfect and imperfect channel state information. In Part II, we develop a practical secret key agreement protocol for Gaussian and quasi-static fading wiretap channels. The protocol… ▽ More

    Submitted 23 November, 2006; originally announced November 2006.

    Comments: 25 pages, 11 figures, submitted to Special Issue of IEEE Trans. on Info. Theory on Information Theoretic Security

  28. arXiv:cs/0611120  [pdf, ps, other

    cs.IT

    Wireless Information-Theoretic Security - Part I: Theoretical Aspects

    Authors: Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin

    Abstract: In this two-part paper, we consider the transmission of confidential data over wireless wiretap channels. The first part presents an information-theoretic problem formulation in which two legitimate partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through another independent quasi-static fading channel. We define the secrecy capacity in ter… ▽ More

    Submitted 22 November, 2006; originally announced November 2006.

    Comments: 27 pages, 14 figures, submitted to Special Issue of IEEE Trans. on Info. Theory on Information Theoretic Security

  29. arXiv:cs/0509041  [pdf, ps, other

    cs.IT

    Efficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes

    Authors: Matthieu Bloch, Andrew Thangaraj, Steven W. McLaughlin

    Abstract: This paper investigates an efficient and practical information reconciliation method in the case where two parties have access to correlated continuous random variables. We show that reconciliation is a special case of channel coding and that existing coded modulation techniques can be adapted for reconciliation. We describe an explicit reconciliation method based on LDPC codes in the case of co… ▽ More

    Submitted 14 September, 2005; originally announced September 2005.

    Comments: 9 pages, 9 figures

  30. arXiv:cs/0411012  [pdf, ps, other

    cs.IT

    Capacity Analysis for Continuous Alphabet Channels with Side Information, Part II: MIMO Channels

    Authors: Majid Fozunbal, Steven W. McLaughlin, Ronald W. Schafer

    Abstract: In this part, we consider the capacity analysis for wireless mobile systems with multiple antenna architectures. We apply the results of the first part to a commonly known baseband, discrete-time multiple antenna system where both the transmitter and receiver know the channel's statistical law. We analyze the capacity for additive white Gaussian noise (AWGN) channels, fading channels with full c… ▽ More

    Submitted 6 November, 2004; originally announced November 2004.

    Comments: Submitted to Trans. Inform. Theory

  31. Capacity Analysis for Continuous Alphabet Channels with Side Information, Part I: A General Framework

    Authors: Majid Fozunbal, Steven W. McLaughlin, Ronald W. Schafer

    Abstract: Capacity analysis for channels with side information at the receiver has been an active area of interest. This problem is well investigated for the case of finite alphabet channels. However, the results are not easily generalizable to the case of continuous alphabet channels due to analytic difficulties inherent with continuous alphabets. In the first part of this two-part paper, we address an a… ▽ More

    Submitted 6 November, 2004; originally announced November 2004.

    Comments: Submitted to IEEE Trans. Inform. Theory

  32. Capacity Achieving Code Constructions for Two Classes of (d,k) Constraints

    Authors: Yogesh Sankarasubramaniam, Steven W. McLaughlin

    Abstract: In this paper, we present two low complexity algorithms that achieve capacity for the noiseless (d,k) constrained channel when k=2d+1, or when k-d+1 is not prime. The first algorithm, called symbol sliding, is a generalized version of the bit flip** algorithm introduced by Aviran et al. [1]. In addition to achieving capacity for (d,2d+1) constraints, it comes close to capacity in other cases.… ▽ More

    Submitted 3 November, 2004; originally announced November 2004.

    Comments: 16 pages, submitted to the IEEE Transactions on Information Theory

  33. arXiv:cs/0411003  [pdf, ps, other

    cs.IT cs.CR

    Applications of LDPC Codes to the Wiretap Channel

    Authors: Andrew Thangaraj, Souvik Dihidar, A. R. Calderbank, Steven McLaughlin, Jean-Marc Merolla

    Abstract: With the advent of quantum key distribution (QKD) systems, perfect (i.e. information-theoretic) security can now be achieved for distribution of a cryptographic key. QKD systems and similar protocols use classical error-correcting codes for both error correction (for the honest parties to correct errors) and privacy amplification (to make an eavesdropper fully ignorant). From a coding perspectiv… ▽ More

    Submitted 29 January, 2007; v1 submitted 2 November, 2004; originally announced November 2004.

    Comments: 30 pages, revised version