Sciweavers

1355 search results - page 181 / 271
» Alternating Timed Automata over Bounded Time
Sort
View
IJNSEC
2008
135views more  IJNSEC 2008»
13 years 9 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
JHSN
2002
119views more  JHSN 2002»
13 years 8 months ago
On the efficacy of quality, frame rate, and buffer management for video streaming across best-effort networks
In this paper, we propose a mechanism that supports the high quality streaming and adaptation of stored, constant-quality video across best-effort networks. The difficulty in the d...
Wu-chi Feng
INFOCOM
2005
IEEE
14 years 2 months ago
Achieving faster access to satellite link bandwidth
TCP with Van Jacobson congestion control (VJCC) is known to have poor performance over large bandwidthdelay product paths. Long delay paths, in particular, can display very poor b...
A. Kapoor, Aaron Falk, Theodore Faber, Y. Pryadkin
IS
2007
13 years 9 months ago
Discovering frequent geometric subgraphs
As data mining techniques are being increasingly applied to non-traditional domains, existing approaches for finding frequent itemsets cannot be used as they cannot model the req...
Michihiro Kuramochi, George Karypis
CVPR
2004
IEEE
14 years 11 months ago
3D Facial Tracking from Corrupted Movie Sequences
In this paper we perform 3D face tracking on corrupted video sequences. We use a deformable model, combined with a predictive filter, to recover both the rigid transformations and...
Siome Goldenstein, Christian Vogler, Dimitris N. M...