Sciweavers

4761 search results - page 695 / 953
» Generalizing Boundary Points
Sort
View
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
MOBICOM
2006
ACM
15 years 10 months ago
Multipath profile discrimination in TOA-based WLAN ranging with link layer frames
Indoor ranging and location in WLAN is possible through obtaining Round-Trip-Time (RTT) measurements at data link level. This procedure allows using the existing IEEE 802.11 WLAN ...
Marc Ciurana, Francisco Barceló, Sebastiano...
PEWASUN
2006
ACM
15 years 10 months ago
Wave propagation using the photon path map
In wireless network planning, much effort is spent on the improvement of the network and transport layer – especially for Mobile Ad Hoc Networks. Although in principle realworl...
Arne Schmitz, Leif Kobbelt
SAC
2006
ACM
15 years 10 months ago
An evaluation system for news video streams and blogs
When we want information on current events, we often view news programs on TV or news streams on Web sites. A news video stream consists of several scenes, and viewers often gain ...
Daisuke Kitayama, Kazutoshi Sumiya
163
Voted
SLIP
2006
ACM
15 years 10 months ago
A tale of two nets: studies of wirelength progression in physical design
At every stage in physical design, engineers are faced with many different objectives and tools to develop, optimize, and evaluate their design. Each choice of a tool or an objec...
Andrew B. Kahng, Sherief Reda