Sciweavers

463 search results - page 86 / 93
» Joint identity-message coding
Sort
View
SAC
2004
ACM
14 years 23 days ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
DCC
2010
IEEE
14 years 14 days ago
Tanner Graph Based Image Interpolation
This paper interprets image interpolation as a channel decoding problem and proposes a tanner graph based interpolation framework, which regards each pixel in an image as a variab...
Ruiqin Xiong, Wen Gao
ICMCS
2000
IEEE
91views Multimedia» more  ICMCS 2000»
13 years 11 months ago
Streaming Video with Optimized Reconstruction-Based DCT
One fundamental problem with streaming video data over unreliable IP networks is that packets may be dropped or arrive too late for real-time playback. Traditional error-control s...
Xiao Su, Benjamin W. Wah
ICC
2007
IEEE
101views Communications» more  ICC 2007»
13 years 11 months ago
Optimal Resource Allocation in Wireless Multiaccess Video Transmissions
We study the problem of optimal resource allocation for multi-user wireless video transmissions from an informationtheoretic point of view. We show that the previously known optima...
Cong Shen, Mihaela van der Schaar
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
13 years 11 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...