Sciweavers

8655 search results - page 1312 / 1731
» Challenges for Trusted Computing
Sort
View
ICMCS
2006
IEEE
136views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Off-Line Motion Description for Fast Video Stream Generation in MPEG-4 AVC/H.264
The rate-distortion optimal mode decision as well as motion estimation adopted in H.264 brings a big challenge to realtime encoding and transcoding duo to the high computation com...
Yi Wang, Xiaoyan Sun, Feng Wu, Shipeng Li, Houqian...
148
Voted
ICMCS
2006
IEEE
125views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Label Disambiguation and Sequence Modeling for Identifying Human Activities from Wearable Physiological Sensors
Wearable physiological sensors can provide a faithful record of a patient’s physiological states without constant attention of caregivers. A computer program that can infer huma...
Wei-Hao Lin, Alexander G. Hauptmann
ICNP
2006
IEEE
15 years 10 months ago
Benefit-based Data Caching in Ad Hoc Networks
—Data caching can significantly improve the efficiency of information access in a wireless ad hoc network by reducing the access latency and bandwidth usage. However, designing e...
Bin Tang, Himanshu Gupta, Samir R. Das
ICPADS
2006
IEEE
15 years 10 months ago
Coloring the Internet: IP Traceback
Several IP Traceback schemes employing packet marking have been proposed to trace DoS/DDoS attacks that use source address spoofing. The major challenges in the design of an ef...
Muthusrinivasan Muthuprasanna, G. Manimaran, Manso...
ICRA
2006
IEEE
159views Robotics» more  ICRA 2006»
15 years 10 months ago
A Visual Compass based on SLAM
— Accurate full 3 axis orientation is computed using a low cost calibrated camera. We present a simultaneous sensor location and mapping method that uses a purely rotating camera...
J. M. M. Montiel, Andrew J. Davison
« Prev « First page 1312 / 1731 Last » Next »