Sciweavers

3357 search results - page 107 / 672
» Controlling Complexity
Sort
View
ICMCS
2006
IEEE
219views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Analysis of Multi-User Congestion Control for Video Streaming Over Wireless Networks
When multiple video sources are live-encoded and transmitted over a common wireless network, each stream needs to adapt its encoding parameters to wireless channel fluctuations, ...
Xiaoqing Zhu, Bernd Girod
ETRICS
2006
15 years 1 months ago
Possibilistic Information Flow Control in MAKS and Action Refinement
Abstract. Formal methods emphasizes the need for a top-down approach when developing large reliable software systems. Refinements are map step by step abstract algebraic specificat...
Dieter Hutter
ACSW
2004
14 years 11 months ago
A Case Study in Access Control Requirements for a Health Information System
We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involv...
Mark Evered, Serge Bögeholz
ICDIM
2007
IEEE
15 years 4 months ago
An access control video watermarking method that is robust to geometric distortions
: A new video watermarking algorithm for access control is introduced. This method is content-dependent and uses the dual tree complex wavelet transform (DT CWT) to create a waterm...
Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreid...
ICRA
2008
IEEE
127views Robotics» more  ICRA 2008»
15 years 4 months ago
Continuous control law from unilateral constraints
— The control approaches based on tasks, and particularly based on a hierarchy of tasks, enable to build complex behaviors with some nice properties of robustness and portability...
Nicolas Mansard, Oussama Khatib