Sciweavers

1898 search results - page 114 / 380
» Weak Keys for IDEA
Sort
View
JVCIR
2008
110views more  JVCIR 2008»
13 years 8 months ago
Video quality and system resources: Scheduling two opponents
In this article we present three key ideas which together form a flexible framework for maximizing user-perceived quality under given resources with modern video codecs (H.264). F...
Michael Roitzsch, Martin Pohlack
TSP
2008
114views more  TSP 2008»
13 years 8 months ago
Clipping-Noise Guided Sign-Selection for PAR Reduction in OFDM Systems
The peak-to-average power ratio (PAR) of orthogonal frequency division multiplexing (OFDM) systems can be reduced by using an optimal set of subcarrier signs. However, this sign se...
Luqing Wang, Chintha Tellambura
TWC
2008
156views more  TWC 2008»
13 years 8 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 8 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
CVPR
2007
IEEE
14 years 11 months ago
Boosting Coded Dynamic Features for Facial Action Units and Facial Expression Recognition
It is well known that how to extract dynamical features is a key issue for video based face analysis. In this paper, we present a novel approach of facial action units (AU) and ex...
Peng Yang, Qingshan Liu, Dimitris N. Metaxas