Sciweavers

483 search results - page 69 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
15 years 6 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
95
Voted
ICIP
1994
IEEE
16 years 1 months ago
A Digital Watermark
This paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capa...
Ron G. van Schyndel, Andrew Z. Tirkel, C. F. Osbor...
ICB
2007
Springer
205views Biometrics» more  ICB 2007»
15 years 6 months ago
Embedded Palmprint Recognition System on Mobile Devices
There are increasing requirements for mobile personal identification, e.g. to protect identity theft in wireless applications. Based on built-in cameras of mobile devices, palmprin...
Yufei Han, Tieniu Tan, Zhenan Sun, Ying Hao
DNA
2006
Springer
130views Bioinformatics» more  DNA 2006»
15 years 1 months ago
Displacement Whiplash PCR: Optimized Architecture and Experimental Validation
Whiplash PCR-based methods of biomolecular computation (BMC), while highly-versatile in principle, are well-known to suffer from a simple but serious form of self-poisoning known a...
John A. Rose, Ken Komiya, Satsuki Yaegashi, Masami...
IAT
2008
IEEE
15 years 6 months ago
Social and Personal Context Modeling for Contact List Recommendation on Mobile Device
This paper presents a social and personal context modeling method on mobile device. It infers user’s contexts, such as amity with others and emotional state, from uncertain logs...
Jun-Ki Min, Hee-Taek Kim, Sung-Bae Cho