Sciweavers

515 search results - page 90 / 103
» A Strategy for Information Source Identification
Sort
View
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
14 years 1 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
GLOBECOM
2007
IEEE
14 years 1 months ago
Sensing Workload Scheduling in Sensor Networks Using Divisible Load Theory
Abstract— This paper presents scheduling strategies for sensing workload in wireless sensor networks using Divisible Load Theory (DLT), which offers a tractable model and realist...
Xiaolin Li, Xinxin Liu, Hui Kang
DSN
2005
IEEE
14 years 1 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
CIVR
2004
Springer
200views Image Analysis» more  CIVR 2004»
14 years 24 days ago
HMM Model Selection Issues for Soccer Video
There has been a concerted effort from the Video Retrieval community to develop tools that automate the annotation process of Sports video. In this paper, we provide an in-depth i...
Mark Baillie, Joemon M. Jose, Cornelis Joost van R...
AGENTS
2001
Springer
13 years 12 months ago
An auction-based method for decentralized train scheduling
We present a computational study of an auction-based method for decentralized train scheduling. The method is well suited to the natural information and control structure of moder...
David C. Parkes, Lyle H. Ungar