Sciweavers

2869 search results - page 555 / 574
» Metropolis-Hastings algorithms with adaptive proposals
Sort
View
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 1 months ago
A Two-Layer Characteristic-based Rate Control Framework for Low Delay Video Transmission
— In this paper, we present a two-layer rate control In [4], their rate controller TMN8 applied the Lagrange framework for low delay video transmission based on a multiplier to d...
Chun-Yuan Chang, Ming-Hung Chen, Cheng-Fu Chou, Di...
IWCMC
2006
ACM
14 years 21 days ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 21 days ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
AVSS
2005
IEEE
14 years 11 days ago
Hypovigilence analysis: open or closed eye or mouth? Blinking or yawning frequency?
This paper proposes a frequency method to estimate the state open or closed of eye and mouth and to detect associated motion events such as blinking and yawning. The context of th...
Alexandre Benoit, Alice Caplier
CIKM
2005
Springer
14 years 8 days ago
Towards estimating the number of distinct value combinations for a set of attributes
Accurately and efficiently estimating the number of distinct values for some attribute(s) or sets of attributes in a data set is of critical importance to many database operation...
Xiaohui Yu, Calisto Zuzarte, Kenneth C. Sevcik