Sciweavers

1534 search results - page 267 / 307
» networks 2011
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 2 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
CVPR
2011
IEEE
13 years 2 months ago
Exploiting Phonological Constraints for Handshape Inference in ASL Video
Handshape is a key linguistic component of signs, and thus, handshape recognition is essential to algorithms for sign language recognition and retrieval. In this work, linguistic ...
Ashwin Thangali, Stan Sclaroff, Carol Neidle, Joan...
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
13 years 2 months ago
Is Happiness Contagious Online? A Case of Twitter and the 2010 Winter Olympics
Is happiness contagious online? To answer this question, this paper investigates the posting behavior of users on Twitter.com, a popular online service for sharing short messages....
Anatoliy A. Gruzd, Sophie Doiron, Philip Mai
ICASSP
2011
IEEE
13 years 2 months ago
No-reference bit stream model for video quality assessment of h.264/AVC video based on packet loss visibility
In this paper, a no reference bit stream model for quality assessment of SD and HD H.264/AVC video sequences based on packet loss visibility is proposed. The method considers the ...
Savvas Argyropoulos, Alexander Raake, Marie-Neige ...
ICASSP
2011
IEEE
13 years 2 months ago
A classifier-based decoding approach for large scale distributed coding
Canonical distributed quantization schemes do not scale to large sensor networks due to the exponential decoder storage complexity that they entail. Prior efforts to tackle this i...
Kumar Viswanatha, Sharadh Ramaswamy, Ankur Saxena,...