Sciweavers

5056 search results - page 918 / 1012
» Network Coding Theory
Sort
View
149
Voted
CCS
2011
ACM
14 years 2 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
149
Voted
MOBICOM
2012
ACM
13 years 5 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
141
Voted
CVPR
2000
IEEE
16 years 4 months ago
Recognizing Upper Face Action Units for Facial Expression Analysis
We develop an automatic system to analyze subtle changes in upper face expressions based on both permanent facial features (brows, eyes, mouth)andtransient facial features (deepen...
Ying-li Tian, Takeo Kanade, Jeffrey F. Cohn
117
Voted
ICIP
2005
IEEE
16 years 4 months ago
3GPP compliant adaptive wireless video streaming using H.264/AVC
In 3GPP a standard for multimedia streaming over mobile networks called PSS (Packet-switched Streaming Service) has been specified. In order to deal with changing transmission char...
Thomas Schierl, Thomas Wiegand, Markus Kampmann
107
Voted
ICIP
2003
IEEE
16 years 4 months ago
Random access using isolated regions
Random access is a desirable feature in many video communication systems. Intra pictures have been conventionally used as random access points, but correct picture content can als...
Miska M. Hannuksela, Ye-Kui Wang, Moncef Gabbouj