Sciweavers

116 search results - page 15 / 24
» End-to-end performance of randomized distributed space-time ...
Sort
View
AUTOMATICA
2006
80views more  AUTOMATICA 2006»
14 years 9 months ago
State estimation over packet dropping networks using multiple description coding
For state estimation over a communication network, efficiency and reliability of the network are critical issues. The presence of packet dropping and communication delay can great...
Zhipu Jin, Vijay Gupta, Richard M. Murray
ICIP
2001
IEEE
15 years 11 months ago
Hierarchical watermarking depending on local constraints
In this paper we propose a new watermarking technique where the watermark is embedded according to two keys. The first key is used to embed a code bit in a block of pixels. The se...
Christopher D. Coltman, Adrian G. Bors
CLUSTER
2008
IEEE
15 years 3 months ago
A comparison of search heuristics for empirical code optimization
—This paper describes the application of various search techniques to the problem of automatic empirical code optimization. The search process is a critical aspect of auto-tuning...
Keith Seymour, Haihang You, Jack Dongarra
96
Voted
IWCMC
2006
ACM
15 years 3 months ago
VANETCODE: network coding to enhance cooperative downloading in vehicular ad-hoc networks
Inter-vehicular communication is fast emerging as a popular application for mobile ad-hoc networks. Content distribution in Vehicular Ad-Hoc Networks (VANET) is particularly chall...
Shabbir Ahmed, Salil S. Kanhere
ICIP
2008
IEEE
15 years 11 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...