Sciweavers

2229 search results - page 270 / 446
» Comparative analysis of biclustering algorithms
Sort
View
ICASSP
2010
IEEE
13 years 11 months ago
A H.264/AVC video database for the evaluation of quality metrics
This paper describes a publicly available database of subjective scores, relative to quality assessment of 156 video streams encoded with H.264/AVC and corrupted by simulating pac...
Francesca De Simone, Marco Tagliasacchi, Matteo Na...
GLOBECOM
2008
IEEE
13 years 11 months ago
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...
IJNSEC
2008
126views more  IJNSEC 2008»
13 years 10 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
IVC
2008
145views more  IVC 2008»
13 years 10 months ago
Camera calibration from human motion
This paper presents a method for the self-calibration of non-rigid affine structure to a Euclidean co-ordinate frame from only two views by enforcing constraints derived from the ...
Philip A. Tresadern, Ian D. Reid
IJON
2006
85views more  IJON 2006»
13 years 10 months ago
From outliers to prototypes: Ordering data
We propose simple and fast methods based on nearest neighbors that order objects from high-dimensional data sets from typical points to untypical points. On the one hand, we show ...
Stefan Harmeling, Guido Dornhege, David M. J. Tax,...