Sciweavers

1757 search results - page 334 / 352
» Secure Content Validation
Sort
View
TMC
2008
138views more  TMC 2008»
13 years 7 months ago
Airtime Fairness for IEEE 802.11 Multirate Networks
Under a multirate network scenario, the IEEE 802.11 DCF MAC fails to provide airtime fairness for all competing stations since the protocol is designed for ensuring max-min through...
Tarun Joshi, Anindo Mukherjee, Younghwan Yoo, Dhar...
TOG
2008
200views more  TOG 2008»
13 years 7 months ago
Improved seam carving for video retargeting
Video, like images, should support content aware resizing. We present video retargeting using an improved seam carving operator. Instead of removing 1D seams from 2D images we rem...
Michael Rubinstein, Ariel Shamir, Shai Avidan
JSAC
2007
132views more  JSAC 2007»
13 years 7 months ago
Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks
— This paper studies the conditions under which P2P sharing can increase the capacity of IPTV services over FTTN networks. For a typical FTTN network, our study shows a) P2P shar...
Yennun Huang, Yih-Farn Chen, Rittwik Jana, Hongbo ...
BMCBI
2004
153views more  BMCBI 2004»
13 years 7 months ago
Computational protein biomarker prediction: a case study for prostate cancer
Background: Recent technological advances in mass spectrometry pose challenges in computational mathematics and statistics to process the mass spectral data into predictive models...
Michael Wagner, Dayanand N. Naik, Alex Pothen, Sri...
CN
2004
95views more  CN 2004»
13 years 7 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...