Sciweavers

13043 search results - page 2302 / 2609
» Simulation of the research process
Sort
View
TCOM
2008
68views more  TCOM 2008»
15 years 4 months ago
Analysis and design of book-ahead bandwidth-sharing mechanisms
In this article, we present a novel discrete-time Markov chain model of book-ahead bandwidthsharing mechanisms. We use this analytical model and a simulation model to understand t...
Xiangfei Zhu, Malathi Veeraraghavan
TCSV
2008
341views more  TCSV 2008»
15 years 4 months ago
H.264-Based Compression of Bayer Pattern Video Sequences
Most consumer digital cameras use a single light sensor which captures color information using a color filter array (CFA). This produces a mosaic image, where each pixel location c...
Colin Doutre, Panos Nasiopoulos, Kostas N. Platani...
TCSV
2008
128views more  TCSV 2008»
15 years 4 months ago
Compression-Aware Energy Optimization for Video Decoding Systems With Passive Power
The objective of dynamic voltage scaling (DVS) is to adapt the frequency and voltage for configurable platforms to obtain energy savings. DVS is especially attractive for video dec...
Emrah Akyol, Mihaela van der Schaar
BIOINFORMATICS
2005
109views more  BIOINFORMATICS 2005»
15 years 4 months ago
Prediction error estimation: a comparison of resampling methods
In genomic studies, thousands of features are collected on relatively few samples. One of the goals of these studies is to build classifiers to predict the outcome of future obser...
Annette M. Molinaro, Richard Simon, Ruth M. Pfeiff...
TIFS
2008
145views more  TIFS 2008»
15 years 4 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
« Prev « First page 2302 / 2609 Last » Next »