Sciweavers

2484 search results - page 477 / 497
» Polymatroids with Network Coding
Sort
View
MOBISYS
2011
ACM
12 years 10 months ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
12 years 10 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
CVPR
2009
IEEE
15 years 2 months ago
Topology Dictionary with Markov Model for 3D Video Content-Based Skimming and Description
This paper presents a novel approach to skim and describe 3D videos. 3D video is an imaging technology which consists in a stream of 3D models in motion captured by a synchronized ...
Tony Tung (Kyoto University), Takashi Matsuyama (K...
ICIP
2007
IEEE
14 years 9 months ago
Multiple Description Video Transcoding
In this paper we introduce the concept of multiple description video transcoding (MDVT). MDVT converts a single description encoded video into two or more descriptions at an interm...
Ali El Essaili, Shoaib Khan, Wolfgang Kellerer, Ec...
ICIP
2003
IEEE
14 years 9 months ago
Spline-based boundary loss concealment
Object-based video coding requires the transmission of the object shape. This shape is sent as a binary a-plane. In lossy packetbased networks, such as the Internet, this informat...
Guido M. Schuster, Xiaohuan Li, Aggelos K. Katsagg...