Sciweavers

459 search results - page 72 / 92
» Hierarchical reliable multicast
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
Packet loss protection of embedded data with fast local search
Unequal loss protection with systematic Reed-Solomon codes allows reliable transmission of embedded multimedia over packet erasure channels. The design of a fast algorithm with lo...
Vladimir Stankovic, Raouf Hamzaoui, Zixiang Xiong
ICPR
2010
IEEE
14 years 2 months ago
Pose Estimation of Known Objects by Efficient Silhouette Matching
Pose estimation is essential for automated han- dling of objects. In many computer vision applications only the object silhouettes can be acquired reliably, because untextured or s...
Christian Reinbacher, Matthias Rüther, Horst Bisc...
WACV
2007
IEEE
14 years 1 months ago
Motion Estimation Using a General Purpose Neural Network Simulator for Visual Attention
Motion detection and estimation is a first step in the much larger framework of attending to visual motion based on Selective Tuning Model of Visual Attention [1]. In order to be ...
Florentin Dorian Vintila, John K. Tsotsos
GLOBECOM
2006
IEEE
14 years 1 months ago
Survivable Wireless Access Network Design with Dual-homing Capabilities
— With the growth of mobile users and the increasing deployment of wireless access network infrastructures, the issue of quality of service is becoming an important component of ...
Mohammad Masud Hasan, Xiaodong Huang, Jason P. Jue
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 1 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl