Sciweavers

236 search results - page 17 / 48
» How Can Intra Correlation Be Exploited Better
Sort
View
INFOCOM
2012
IEEE
11 years 9 months ago
Spectrum mobility games
Cognitive radio gives users the ability to switch channels and make use of dynamic spectral opportunities. However, switching channels takes time, and may disrupt the quality of a...
Richard Southwell, Jianwei Huang, Xin Liu
ICIP
2001
IEEE
14 years 9 months ago
A temporal error concealment method for MPEG coded video using a multi-frame boundary matching algorithm
Compressed video sequences are very sensitive to channel disturbances when they are transmitted through an unreliable environment such as a wireless channel. The transmission erro...
Yen-Chi Lee, Yucel Altunbasak, Russell M. Merserea...
IPPS
2006
IEEE
14 years 1 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
JSAC
2007
105views more  JSAC 2007»
13 years 7 months ago
Inferring Network-Wide Quality in P2P Live Streaming Systems
—This paper explores how to remotely monitor network-wide quality in mesh-pull P2P live streaming systems. Peers in such systems advertise to each other buffer maps which summari...
Xiaojun Hei, Yong Liu, Keith W. Ross
LREC
2010
145views Education» more  LREC 2010»
13 years 8 months ago
Generic Ontology Learners on Application Domains
In ontology learning from texts, we have ontology-rich domains where we have large structured domain knowledge repositories or we have large general corpora with large general str...
Francesca Fallucchi, Maria Teresa Pazienza, Fabio ...