Sciweavers

939 search results - page 109 / 188
» A Case for Polyscopic Structuring of Information
Sort
View
DCC
2002
IEEE
14 years 8 months ago
Source Requantization: Successive Degradation and Bit Stealing
We consider source requantization in two forms -- successive degradation (i.e., source fidelity reduction) and bit stealing (i.e., information embedding) -when no forward planning...
Aaron S. Cohen, Stark C. Draper, Emin Martinian, G...
IJCOMSYS
2002
43views more  IJCOMSYS 2002»
13 years 8 months ago
A novel delineation mechanism for the ATM adaptation layer 2 over wireless ATM networks
The ATM Adaptation Layer 2 (AAL2) has been standardized by the ITU-T for the support of low data rate and delaysensitive applications, such as voice, over ATM networks. One of the...
Luis Villasenor-Gonzalez, Luis Orozco-Barbosa, Lou...
TSP
2008
134views more  TSP 2008»
13 years 8 months ago
A Mapping-Based Design for Nonsubsampled Hourglass Filter Banks in Arbitrary Dimensions
Multidimensional hourglass filter banks decompose the frequency spectrum of input signals into hourglass-shaped directional subbands, each aligned with one of the frequency axes. T...
Yue M. Lu, Minh N. Do
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 7 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
INFOCOM
2010
IEEE
13 years 6 months ago
Optimal Solutions for Single Fault Localization in Two Dimensional Lattice Networks
Abstract--Achieving fast, precise, and scalable fault localization has long been a highly desired feature in all-optical mesh networks. Monitoring tree (m-tree) is an interesting m...
János Tapolcai, Lajos Rónyai, Pin-Ha...