Sciweavers

1562 search results - page 238 / 313
» Convenience Over Correctness
Sort
View
JCM
2008
70views more  JCM 2008»
14 years 9 months ago
Reed-Solomon Codes for Low Power Communications
Power consumption is a critical issue for many applications running on autonomous battery operated devices. In the context of low power communications, the use of Forward Error Cor...
Lionel Biard, Dominique Noguet
JMM2
2008
130views more  JMM2 2008»
14 years 9 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
JMM2
2006
139views more  JMM2 2006»
14 years 9 months ago
Robust Real-time 3D Detection of Obstructed Head and Hands in Indoors Environments
We address the need for robust detection of obstructed human features in complex environments, with a focus on intelligent surgical UIs. In our setup, real-time detection is used t...
Sébastien Grange, Charles Baur
ENTCS
2007
131views more  ENTCS 2007»
14 years 9 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
ENTCS
2007
84views more  ENTCS 2007»
14 years 9 months ago
A Rewriting Logic Framework for Soft Constraints
Soft constraints extend classical constraints to deal with non-functional requirements, overconstrained problems and preferences. Bistarelli, Montanari and Rossi have developed a ...
Martin Wirsing, Grit Denker, Carolyn L. Talcott, A...