Sciweavers

112 search results - page 17 / 23
» Resilient Peer-to-Peer Streaming
Sort
View
ICIP
2004
IEEE
14 years 10 months ago
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of no...
Philippe Jost, Pierre Vandergheynst, Pascal Frossa...
ICDE
2007
IEEE
99views Database» more  ICDE 2007»
14 years 2 months ago
A QoS-based Service Composition for Content Adaptation
Today’s Internet suffers from the problem of heterogeneity in client devices, network connectivity, content format, and users’ preferences. The framework presented in this pap...
Khalil El-Khatib, Gregor von Bochmann, Abdulmotale...
FSE
2003
Springer
125views Cryptology» more  FSE 2003»
14 years 1 months ago
On Plateaued Functions and Their Constructions
We use the notion of covering sequence, introduced by C. Carlet and Y. Tarannikov, to give a simple characterization of bent functions. We extend it into a characterization of plat...
Claude Carlet, Emmanuel Prouff
VTC
2008
IEEE
120views Communications» more  VTC 2008»
14 years 3 months ago
Boosting Video Capacity of IEEE 802.11n through Multiple Receiver Frame Aggregation
—The technology based on the IEEE 802.11 standard has been hugely successful, and is evolving towards even higher speeds and richer features. In particular, the 802.11n amendment...
Kyungsoo Lee, Sangki Yun, Hyogon Kim
ISM
2005
IEEE
153views Multimedia» more  ISM 2005»
14 years 2 months ago
Application Layer Error Correction Scheme for Video Header Protection on Wireless Network
In wireless video streaming application, video information may be corrupted by a noisy channel. By introducing error resilience and error concealment techniques, many researchers ...
Chia-Ho Pan, I-Hsien Lee, Sheng-Chieh Huang, Chih-...