Sciweavers

1209 search results - page 54 / 242
» Effective bandwidths with priorities
Sort
View
ICPR
2008
IEEE
14 years 2 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma
ISCAS
2003
IEEE
108views Hardware» more  ISCAS 2003»
14 years 29 days ago
View-dependent transmission of 3-D normal meshes
—A unified approach to rate-distortion (R-D) optimized compression and view-dependent transmission of three-dimensional (3-D) normal meshes is investigated in this work. A norma...
Jae-Young Sim, Chang-Su Kim, C. C. Jay Kuo, Sang U...
CN
2002
85views more  CN 2002»
13 years 7 months ago
Analysis of delay and delay jitter of voice traffic in the Internet
In the future, voice communication is expected to migrate from the public switched telephone network to the Internet. Because of the particular characteristics (low volume and bur...
Mansour J. Karam, Fouad A. Tobagi
INFOCOM
2003
IEEE
14 years 29 days ago
Integrating effective-bandwidth-based QoS routing and best effort routing
—A methodology is presented for integrating effective-bandwidth-based routing for QoS-sensitive traffic and datagram routing of the best-effort traffic. To prevent excessive dela...
Stephen L. Spitler, Daniel C. Lee
INFOCOM
2012
IEEE
11 years 10 months ago
Delay optimal multichannel opportunistic access
Abstract—The problem of minimizing queueing delay of opportunistic access of multiple continuous time Markov channels is considered. A new access policy based on myopic sensing a...
Shiyao Chen, Lang Tong, Qing Zhao