Sciweavers

358 search results - page 12 / 72
» Protocols from perceptual observations
Sort
View
ICISC
2007
95views Cryptology» more  ICISC 2007»
13 years 8 months ago
Security-Preserving Asymmetric Protocol Encapsulation
Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different ro...
Raphael C.-W. Phan, Serge Vaudenay
WS
2005
ACM
14 years 29 days ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
ICDCS
2000
IEEE
13 years 11 months ago
An Adaptive, Perception-Driven Error Spreading Scheme in Continuous Media Streaming
For transmission of continuous media (CM) streams such as audio and video over the Internet, a critical issue is that periodic network overloads cause bursty packet losses. Studie...
Srivatsan Varadarajan, Hung Q. Ngo, Jaideep Srivas...
TCSV
2010
13 years 2 months ago
Distributed Media-Aware Rate Allocation for Wireless Video Streaming
This paper addresses the rate allocation problem for wireless video streaming. Results from a simple subjective viewing test indicate that perceptually preferred allocation can be...
Xiaoqing Zhu, Bernd Girod
ICRA
2008
IEEE
133views Robotics» more  ICRA 2008»
14 years 1 months ago
Object separation using active methods and multi-view representations
— Daily life objects reveal natural similarities, which cannot be resolved with the perception of a single view. In this paper, we present an approach for object separation using...
Kai Welke, Tamim Asfour, Rüdiger Dillmann