Sciweavers

2572 search results - page 443 / 515
» codes 2008
Sort
View
ICDCS
2008
IEEE
14 years 5 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ICIP
2008
IEEE
14 years 5 months ago
A low-complexity packet classification algorithm for multiple description video streaming over IEEE802.11E networks
The robust transmission of video sequences over wireless LANs presents several challenging problems concerning the presence of packet losses, delays, and bandwidth limitations. Th...
Simone Milani, Giancarlo Calvagno, Riccardo Bernar...
ICIP
2008
IEEE
14 years 5 months ago
Model-based compression of nonstationary landmark shape sequences
We have proposed a novel model-based compression technique for nonstationary landmark shape data extracted from video sequences. The main goal is to develop a technique for the co...
Samarjit Das, Namrata Vaswani
ICIP
2008
IEEE
14 years 5 months ago
Exploiting local auto-correlation function for fast video to reference image alignment
Digital images of natural scenes are usually characterized by strong spatial correlation between adjacent pixels which has been successfully exploited in the coding of still and m...
Arif Mahmood, Sohaib Khan
ICPP
2008
IEEE
14 years 5 months ago
Implementing and Exploiting Inevitability in Software Transactional Memory
—Transactional Memory (TM) takes responsibility for concurrent, atomic execution of labeled regions of code, freeing the programmer from the need to manage locks. Typical impleme...
Michael F. Spear, Michael Silverman, Luke Dalessan...