Sciweavers

2562 search results - page 480 / 513
» An Internet without the Internet protocol
Sort
View
179
Voted
TMC
2010
165views more  TMC 2010»
14 years 10 months ago
Energy-Efficient VoIP over Wireless LANs
Emerging dual-mode phones incorporate a Wireless LAN (WLAN) interface along with the traditional cellular interface. The additional benefits of the WLAN interface are, however, lik...
Vinod Namboodiri, Lixin Gao
130
Voted
ICPR
2004
IEEE
16 years 4 months ago
Face Authentication Test on the BANCA Database
This paper details the results of a Face Authentication Test (FAT2004) [2] held in conjunction with the 17th International Conference on Pattern Recognition. The contest was held ...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, Mi...
147
Voted
CCS
2009
ACM
16 years 4 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
134
Voted
ICIP
2004
IEEE
16 years 5 months ago
Rate-constrained adaptive fec for video over erasure channels with memory
Current adaptive FEC schemes used for video streaming applications alter the redundancy in a block of message packets to adapt to varying channel conditions. However, for many pop...
Shirish S. Karande, Hayder Radha
226
Voted
GIS
2005
ACM
16 years 4 months ago
Automatic extraction of road intersections from raster maps
Numerous raster maps are available on the Internet, but the geographic coordinates of the maps are often unknown. In order to determine the precise location of a raster map, we ex...
Yao-Yi Chiang, Craig A. Knoblock, Ching-Chien Chen