Sciweavers

733 search results - page 6 / 147
» An Experimental Evaluation of Rate Adaptation for Multi-Ante...
Sort
View
ICIAR
2010
Springer
14 years 11 days ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
TCOM
2008
128views more  TCOM 2008»
13 years 7 months ago
Cross-Layer Rate and Power Adaptation Strategies for IR-HARQ Systems over Fading Channels with Memory: A SMDP-Based Approach
Abstract--Incremental-redundancy hybrid automatic repeatrequest (IR-HARQ) schemes are proposed in several wireless standards for increased throughput-efficiency and greater reliabi...
Ashok K. Karmokar, Dejan V. Djonin, Vijay K. Bharg...
SP
2006
IEEE
123views Security Privacy» more  SP 2006»
14 years 1 months ago
A Framework for the Evaluation of Intrusion Detection Systems
Classification accuracy in intrusion detection systems (IDSs) deals with such fundamental problems as how to compare two or more IDSs, how to evaluate the performance of an IDS, ...
Alvaro A. Cárdenas, John S. Baras, Karl Sea...
SIGCOMM
2010
ACM
13 years 7 months ago
Vehicular wifi access and rate adaptation
Abstract--Vehicular WiFi access is distinct in two respects, (i) continuous mobility of clients and (ii) possibility of predictable link quality. As part of this study, we aim to c...
Ajinkya Uday Joshi, Purushottam Kulkarni
ICIP
1999
IEEE
14 years 9 months ago
Adaptive Wavelet-Packet Decomposition for Rate Control of Object Oriented Coding of Video Sequences
A novel object dependent coding scheme based on optimization upon wavelet packet trees is proposed. The method may be employed in the context of object oriented video standard MPE...
Ioannis Stephanakis, Anastasios D. Doulamis, Nikol...