Sciweavers

1318 search results - page 236 / 264
» Measuring network security using dynamic bayesian network
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
Adaptable K-nearest neighbor for image interpolation
A variant of the k-nearest neighbor algorithm is proposed for image interpolation. Instead of using a static volume or static k, the proposed algorithm determines a dynamic k that...
Kenta S. Ni, Truong Q. Nguyen
ICMCS
2000
IEEE
122views Multimedia» more  ICMCS 2000»
13 years 11 months ago
Optimal Streaming of Layer-Encoded Multimedia Presentations
In the context of communication networks with no QoS guarantees, we describe the problem of streaming layer encoded multimedia presentation data as a two-phase decision problem. W...
David A. Turner, Keith W. Ross
MTA
2008
150views more  MTA 2008»
13 years 7 months ago
Evaluation and monitoring of video quality for UMA enabled video streaming systems
This paper1 deals with monitoring user perception of multimedia presentations in a Universal Multimedia Access (UMA) enabled system using objective no-reference (NR) metrics. Thes...
R. Venkatesh Babu, Andrew Perkis, Odd Inge Hillest...
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 3 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...