Sciweavers

1462 search results - page 290 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
ICRA
2008
IEEE
182views Robotics» more  ICRA 2008»
15 years 3 months ago
A body joint improves vertical to horizontal transitions of a wall-climbing robot
— Several recently-designed robots are able to scale steep surfaces using animal-inspired strategies for foot attachment and leg kinematics. These designs could be valuable for r...
Kathryn A. Daltorio, Timothy C. Witushynsky, Grego...
JSAC
2010
99views more  JSAC 2010»
14 years 8 months ago
Robust wireless video streaming using hybrid spatial/temporal retransmission
—Bandwidth demands and timing constraints are two major challenges for wireless video streaming applications. In this paper, we present a hybrid spatial/temporal retransmission p...
Mei-Hsuan Lu, Peter Steenkiste, Tsuhan Chen
ODRL
2004
14 years 11 months ago
Interoperability between ODRL and MPEG-21 REL
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...
Josep Polo, Jose Prados, Jaime Delgado
ICMCS
1997
IEEE
131views Multimedia» more  ICMCS 1997»
15 years 1 months ago
A Novel Video Layout Strategy for Near-Video-on-Demand Servers
Near-Video-on-Demand (NVOD) provides customers with a service model completely different from true Video-on-Demand (VOD). In the NVOD service model, customers’ requests are not ...
Shenze Chen, Manu Thapar
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin