Sciweavers

107 search results - page 9 / 22
» Some Applications of Bounds for Designs to the Cryptography
Sort
View
ICPP
2005
IEEE
14 years 9 days ago
Design and Implementation of Overlay Multicast Protocol for Multimedia Streaming
In this paper, we propose a new protocol called Shared Tree Streaming (or STS in short) protocol that is designed for interactive multimedia streaming applications. STS is a decen...
Thilmee M. Baduge, Akihito Hiromori, Hirozumi Yama...
ICCV
2007
IEEE
14 years 8 months ago
Limits of Learning-Based Superresolution Algorithms
Learning-based superresolution (SR) are popular SR techniques that use application dependent priors to infer the missing details in low resolution images (LRIs). However, their pe...
Zhouchen Lin, Junfeng He, Xiaoou Tang, Chi-Keung T...
DM
2008
87views more  DM 2008»
13 years 6 months ago
More on pooling spaces
A pooling space is a ranked poset P such that the subposet w+ induced by the elements above w is atomic for each element w of P. Pooling spaces were introduced in [Discrete Mathem...
Hau-wen Huang, Yu-pei Huang, Chih-wen Weng
PUC
2008
174views more  PUC 2008»
13 years 6 months ago
A wireless sensor networks MAC protocol for real-time applications
Abstract Wireless sensor networks (WSN) are designed for data gathering and processing, with particular requirements: low hardware complexity, low energy consumption, special traff...
Esteban Egea-López, Javier Vales-Alonso, Al...
MOBIHOC
2009
ACM
14 years 7 months ago
Admission control and scheduling for QoS guarantees for variable-bit-rate applications on wireless channels
Providing differentiated Quality of Service (QoS) over unreliable wireless channels is an important challenge for supporting several future applications. We analyze a model that h...
I-Hong Hou, P. R. Kumar