Sciweavers

41650 search results - page 8266 / 8330
» Distribution of
Sort
View
TCSV
2010
13 years 3 months ago
No-Reference Quality Assessment of H.264/AVC Encoded Video
Abstract--This paper proposes a no-reference quality assessment metric for digital video subject to H.264/AVC encoding. The proposed metric comprises two main steps: coding error e...
Tomás Brandão, Tiago Rosa Maria Paul...
TEC
2010
112views more  TEC 2010»
13 years 3 months ago
Population-Based Algorithm Portfolios for Numerical Optimization
In this paper, we consider the scenario that a population-based algorithm is applied to a numerical optimization problem and a solution needs to be presented within a given time bu...
Fei Peng, Ke Tang, Guoliang Chen, Xin Yao
TIFS
2010
130views more  TIFS 2010»
13 years 3 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
TISSEC
2010
119views more  TISSEC 2010»
13 years 3 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
TIT
2010
156views Education» more  TIT 2010»
13 years 3 months ago
Bandwidth and power allocation for cooperative strategies in Gaussian relay networks
Abstract-- In a relay network with a single sourcedestination pair, we examine the achievable rates with amplifyand-forward (AF) relaying strategy. Motivated by applications in sen...
Ivana Maric, Roy D. Yates
« Prev « First page 8266 / 8330 Last » Next »