Sciweavers

483 search results - page 69 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
ICIP
1994
IEEE
15 years 11 months ago
A Digital Watermark
This paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capa...
Ron G. van Schyndel, Andrew Z. Tirkel, C. F. Osbor...
ICB
2007
Springer
205views Biometrics» more  ICB 2007»
15 years 3 months ago
Embedded Palmprint Recognition System on Mobile Devices
There are increasing requirements for mobile personal identification, e.g. to protect identity theft in wireless applications. Based on built-in cameras of mobile devices, palmprin...
Yufei Han, Tieniu Tan, Zhenan Sun, Ying Hao
DNA
2006
Springer
130views Bioinformatics» more  DNA 2006»
14 years 11 months ago
Displacement Whiplash PCR: Optimized Architecture and Experimental Validation
Whiplash PCR-based methods of biomolecular computation (BMC), while highly-versatile in principle, are well-known to suffer from a simple but serious form of self-poisoning known a...
John A. Rose, Ken Komiya, Satsuki Yaegashi, Masami...
IAT
2008
IEEE
15 years 4 months ago
Social and Personal Context Modeling for Contact List Recommendation on Mobile Device
This paper presents a social and personal context modeling method on mobile device. It infers user’s contexts, such as amity with others and emotional state, from uncertain logs...
Jun-Ki Min, Hee-Taek Kim, Sung-Bae Cho