Sciweavers

2229 search results - page 270 / 446
» Comparative analysis of biclustering algorithms
Sort
View
79
Voted
ICASSP
2010
IEEE
15 years 25 days ago
A H.264/AVC video database for the evaluation of quality metrics
This paper describes a publicly available database of subjective scores, relative to quality assessment of 156 video streams encoded with H.264/AVC and corrupted by simulating pac...
Francesca De Simone, Marco Tagliasacchi, Matteo Na...
143
Voted
GLOBECOM
2008
IEEE
15 years 24 days ago
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...
109
Voted
IJNSEC
2008
126views more  IJNSEC 2008»
15 years 19 days ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
82
Voted
IVC
2008
145views more  IVC 2008»
15 years 19 days ago
Camera calibration from human motion
This paper presents a method for the self-calibration of non-rigid affine structure to a Euclidean co-ordinate frame from only two views by enforcing constraints derived from the ...
Philip A. Tresadern, Ian D. Reid
79
Voted
IJON
2006
85views more  IJON 2006»
15 years 19 days ago
From outliers to prototypes: Ordering data
We propose simple and fast methods based on nearest neighbors that order objects from high-dimensional data sets from typical points to untypical points. On the one hand, we show ...
Stefan Harmeling, Guido Dornhege, David M. J. Tax,...