Sciweavers

2006 search results - page 312 / 402
» Heuristic Security-Testing Methods
Sort
View
ICIP
2007
IEEE
14 years 3 months ago
Joint Optimization of Transform Coefficients for Hierarchical B Picture Coding in H.264/AVC
Coding of video sequences using hierarchical B pictures in the Joint Scalable Video Model (JSVM) for the scalability amendment of H.264/AVC has the benefit of improved rate distor...
Martin Winken, Heiko Schwarz, Detlev Marpe, Thomas...
INFOCOM
2007
IEEE
14 years 3 months ago
On Scalability of Proximity-Aware Peer-to-Peer Streaming
—P2P (peer-to-peer) technology has proved itself an efficient and cost-effective solution to support large-scale multimedia streaming. Different from traditional P2P application...
Liang Dai, Yi Cui, Yuan Xue
IROS
2007
IEEE
171views Robotics» more  IROS 2007»
14 years 3 months ago
A Kalman filter for robust outlier detection
— In this paper, we introduce a modified Kalman filter that can perform robust, real-time outlier detection in the observations, without the need for parameter tuning. Robotic ...
Jo-Anne Ting, Evangelos Theodorou, Stefan Schaal
LCN
2007
IEEE
14 years 3 months ago
Placing Multicast Proxies for Internet Live Media Streaming
— Placing multicast proxies on the Internet can largely reduce the delivery delay of Internet live media streaming using overlay multicast mechanisms. In this paper, we propose a...
Jun Guo, Sanjay Jha
RTCSA
2007
IEEE
14 years 3 months ago
Real-Time Scheduling with Task Splitting on Multiprocessors
This paper presents a real-time scheduling algorithm with high schedulability and few preemptions for multiprocessor systems. The algorithm is based on an unorthodox method called...
Shinpei Kato, Nobuyuki Yamasaki